Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upQubes Manager/ Firewall: Rules for incoming/ outgoing traffic only #962
Comments
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Apr 25, 2015
Member
What do you mean by "inbound connections"? Those are blocked in Qubes and it is really not a simple task to allow such connections because of multiple layers of firewalls (netvm, firewallvm, the target VM itself). Details here: https://www.qubes-os.org/doc/QubesFirewall/#port-forwarding-to-an-appvm-from-the-outside-world
|
What do you mean by "inbound connections"? Those are blocked in Qubes and it is really not a simple task to allow such connections because of multiple layers of firewalls (netvm, firewallvm, the target VM itself). Details here: https://www.qubes-os.org/doc/QubesFirewall/#port-forwarding-to-an-appvm-from-the-outside-world |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
nvesely
Apr 25, 2015
This was one of my lesser thought out suggestions/ bug reports I filed late last night. Feel free to close it.
nvesely
commented
Apr 25, 2015
|
This was one of my lesser thought out suggestions/ bug reports I filed late last night. Feel free to close it. |
nvesely commentedApr 25, 2015
It would be nice to only allow outbound or inbound connections (esp. combined with my other Qubes Manager/ Firewall suggestion: port specific rules). Maybe borrow some code from GUFW?