Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upChanging firewall rules doesn't affect established connections #1717
Comments
marmarek
referenced this issue
Feb 2, 2016
Closed
Qubes Firewall - Add rules to QBS-prefixed chain #974
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
Show comment
Hide comment
marmarek
Feb 2, 2016
Member
It looks like a duplicate of #974 and feature discussed in https://groups.google.com/d/msgid/qubes-devel/20160114163808.GW4892%40mail-itl
But generally - the ultimate way for cutting a VM from the network, is setting its "netvm" to "none".
|
It looks like a duplicate of #974 and feature discussed in https://groups.google.com/d/msgid/qubes-devel/20160114163808.GW4892%40mail-itl |
marmarek
closed this
Feb 2, 2016
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
kirill9000 commentedFeb 2, 2016
I.e.: 1) start downloading something in AppVM, 2) go to VM Manager and change AppVM's firewall rules to "Deny" with no exceptions, 3) download continues.
That's because of "global" allowing rule in FirewallVM:
-A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPTMaybe it should be split to per-AppVM rules?