New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Unable to set firewall rules on sys-whonix #3290

Closed
mirrorway opened this Issue Nov 7, 2017 · 2 comments

Comments

Projects
None yet
4 participants
@mirrorway

mirrorway commented Nov 7, 2017

Qubes OS version: R4.0-rc2

Steps to reproduce the behavior:

  1. Open VM settings for sys-whonix.
  2. Go to Firewall rules tab

Expected behavior:

Can restrict outgoing connections via Firewall rules tab, e.g. to tor entry nodes.

Actual behavior:

Firewall tab grayed out.

@marmarek marmarek added this to the Release 4.0 milestone Nov 7, 2017

marmarek added a commit to marmarek/qubes-core-agent-linux that referenced this issue Nov 20, 2017

Enable qubes-firewall also in "NetVM"
In some cases it may make sense to enfoce outgoing firewall also on
sys-net. If the service is disabled, firewall settings will be
(silently) ignored, so better be on the safe side and enable.

QubesOS/qubes-issues#3290

marmarek added a commit to marmarek/qubes-core-agent-linux that referenced this issue Nov 20, 2017

Enable qubes-firewall also in "NetVM"
In some cases it may make sense to enfoce outgoing firewall also on
sys-net. If the service is disabled, firewall settings will be
(silently) ignored, so better be on the safe side and enable.

QubesOS/qubes-issues#3290

@marmarta marmarta referenced this issue in QubesOS/qubes-manager Nov 20, 2017

Merged

Enabled Firewall config without a netvm #50

@qubesos-bot

This comment has been minimized.

Show comment
Hide comment
@qubesos-bot

qubesos-bot Nov 21, 2017

Automated announcement from builder-github

The package qubes-manager-4.0.9-1.fc25 has been pushed to the r4.0 testing repository for dom0.
To test this update, please install it with the following command:

sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing

Changes included in this update

Automated announcement from builder-github

The package qubes-manager-4.0.9-1.fc25 has been pushed to the r4.0 testing repository for dom0.
To test this update, please install it with the following command:

sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing

Changes included in this update

@qubesos-bot

This comment has been minimized.

Show comment
Hide comment
@qubesos-bot

qubesos-bot Dec 11, 2017

Automated announcement from builder-github

The package qubes-manager-4.0.9-1.fc25 has been pushed to the r4.0 stable repository for dom0.
To install this update, please use the standard update command:

sudo qubes-dom0-update

Or update dom0 via Qubes Manager.

Changes included in this update

Automated announcement from builder-github

The package qubes-manager-4.0.9-1.fc25 has been pushed to the r4.0 stable repository for dom0.
To install this update, please use the standard update command:

sudo qubes-dom0-update

Or update dom0 via Qubes Manager.

Changes included in this update

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment