New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

"Firewall" VM #63

Closed
marmarek opened this Issue Mar 8, 2015 · 3 comments

Comments

Projects
None yet
2 participants
@marmarek
Member

marmarek commented Mar 8, 2015

Reported by joanna on 27 Jul 2010 14:15 UTC

  • Make sure the user doesn't accidentally use a sensitive VM from less-sensitive task (e.g. the user might want to be able to whitelist the "banking" VM to only be able to connect to the bank HTTPS server)
  • Prevent VM leaks

Features:

  • TCP/IP-based filtering
  • HTTPS-level filtering (e.g. allow connection only to HTTPS servers with specific SSL certificate!)
  • GUI for user configuration

Migrated-From: https://wiki.qubes-os.org/ticket/63

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Mar 8, 2015

Member

Modified by joanna on 13 Oct 2010 10:10 UTC

Member

marmarek commented Mar 8, 2015

Modified by joanna on 13 Oct 2010 10:10 UTC

@marmarek marmarek added P: critical and removed P: major labels Mar 8, 2015

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Mar 8, 2015

Member

Modified by smoku on 14 Mar 2011 19:26 UTC

Member

marmarek commented Mar 8, 2015

Modified by smoku on 14 Mar 2011 19:26 UTC

@marmarek marmarek closed this Mar 8, 2015

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment