Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upUpdateVM system defaults should only list NetVMs and ProxyVMs #1831
Comments
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Mar 15, 2016
Member
Why? It is perfectly fine to have any AppVM set there. For example a VM behind Tor, or VPN, to be sure that yumdownloader/ntpdate will not see real IP.
|
Why? It is perfectly fine to have any AppVM set there. For example a VM behind Tor, or VPN, to be sure that yumdownloader/ntpdate will not see real IP. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
mfc
Mar 15, 2016
Member
For example a VM behind Tor, or VPN, to be sure that yumdownloader/ntpdate will not see real IP.
those VMs are ProxyVMs, no?
those VMs are ProxyVMs, no? |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
mfc
Mar 15, 2016
Member
Why?
I can't think of a single use-case where a user should be putting their network traffic through a "qube" (AppVM) or a template, rather than a ProxyVM.
I can't think of a single use-case where a user should be putting their network traffic through a "qube" (AppVM) or a template, rather than a ProxyVM. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Mar 15, 2016
Member
those VMs are ProxyVMs, no?
But those ProxyVMs itself see the real IP. Only VMs behind are are really isolated. I think Whonix gateway is some exception here - it also torify traffic originating directly from it.
(I agree templates are useless on that list)
But those ProxyVMs itself see the real IP. Only VMs behind are are really isolated. I think Whonix gateway is some exception here - it also torify traffic originating directly from it. (I agree templates are useless on that list) |
marmarek
added
C: qubes-manager
UX
help wanted
labels
Mar 18, 2016
marmarek
added this to the Release 4.0 milestone
Mar 18, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
adrelanos
Mar 18, 2016
Member
Marek Marczykowski-Górecki:
I think Whonix gateway is some exception here - it also torify traffic originating directly from it.
Yes.
|
Marek Marczykowski-Górecki:
Yes. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
bnvk
Mar 22, 2016
But those ProxyVMs itself see the real IP. Only VMs behind are are really isolated. I think Whonix gateway is some exception here - it also torify traffic originating directly from it.
So, then perhaps the solution I think @mfc is after (making this selection process more simple + safe for users) is to only show AppVMs, or Whonix gateway so as to not allow users to accidentally leak their real IP
bnvk
commented
Mar 22, 2016
So, then perhaps the solution I think @mfc is after (making this selection process more simple + safe for users) is to only show AppVMs, or Whonix gateway so as to not allow users to accidentally leak their real IP |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
andrewdavidwong
Mar 23, 2016
Member
Probably the same should be done for
ClockVM.
IIUC, this part is much more complicated. See:
- https://www.whonix.org/wiki/Dev/Qubes#Time_Sync
- https://www.whonix.org/wiki/Dev/TimeSync
- https://groups.google.com/forum/#!msg/qubes-devel/YHK_rAUm0s0/ARrBPHrf0fkJ
- https://groups.google.com/d/msg/qubes-users/AqZV65yZLuU/Lh8T7ZL6tdIJ
- https://groups.google.com/d/msg/qubes-devel/XN6JrEXVOVA/c1S07O8VpfMJ
- https://groups.google.com/d/topic/qubes-users/3QNzrcoRyMI/discussion
IIUC, this part is much more complicated. See:
|
added a commit
that referenced
this issue
Jun 7, 2016
andrewdavidwong
added
the
enhancement
label
Mar 31, 2018
andrewdavidwong
modified the milestones:
Release 4.0,
Release 4.1
Mar 31, 2018
marmarta
referenced this issue
in QubesOS/qubes-manager
Jul 12, 2018
Merged
Remove templates from listing in UpdateVM and ClockVm in Global Settings #105
added a commit
to marmarta/qubes-manager
that referenced
this issue
Jul 12, 2018
marmarek
closed this
in
marmarek/qubes-manager@efa2b2d
Jul 12, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Jul 18, 2018
Automated announcement from builder-github
The package qubes-manager-4.0.19-1.fc25 has been pushed to the r4.0 testing repository for dom0.
To test this update, please install it with the following command:
sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing
qubesos-bot
commented
Jul 18, 2018
|
Automated announcement from builder-github The package
|
mfc commentedMar 15, 2016
Currently in Qubes VM Manager > System > System defaults > UpdateVM, it lists all VMs as possibilities for
UpdateVM. It should only list netvms and proxyvms. Probably the same should be done forClockVM.