qubes-vpn | Leakproof VPN for your Qubes OS system | VPN library
kandi X-RAY | qubes-vpn Summary
kandi X-RAY | qubes-vpn Summary
This package allows you to set up a leakproof OpenVPN VM on your Qubes OS system. All VMs attached to the VPN VM are automatically and transparently routed through the VPN. DNS requests do not hit the NetVM — they get routed through the VPN instead. Connection and disconnection events are notified using the desktop notification system. When the VPN connection is lost, traffic is automatically blackholed without any intervention. All system state changes during VPN operation are (a) volatile (b) minimal (c) non-interfering with normal Qubes OS ProxyVM operation.
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of qubes-vpn
qubes-vpn Key Features
qubes-vpn Examples and Code Snippets
Community Discussions
Trending Discussions on qubes-vpn
QUESTION
I am attempting to make a file my_script.sh
executable by using the sudo chmod +x my_script.sh
command. I created the file my_script.sh with sudo gedit my_script.sh
I did my writing in the file, then I used chattr +i /etc/resolv.conf
to save the change.
I then attempted the sudo chmod +x my_script.sh
command, but received the output chmod: changing permissions of '/rw/config/vpn/qubes-vpn-handler.sh': Operation not permitted
. I've looked all over the web and on these forums and have found a number of posts offering solutions about changing ownership, etc. However, these all meet with the same result. I'm including some examples below, in case they're helpful:
ANSWER
Answered 2020-Feb-22 at 08:10It is because of the chattr +i
have a look at the man page : https://linux.die.net/man/1/chattr.
It prevents any user including the root from modifying or deleting a file. You can do chattr -i
to change that.
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install qubes-vpn
Clone this repository.
Make the RPM on the folder of your clone make rpm
Copy the RPM to your Qubes OS template: qvm-copy-to-vm fedora-23 /path/to/qubes-vpn*.noarch.rpm
Install the RPM on the template: dnf install /path/to/qubes-vpn*.noarch.rpm
Power off the template.
Launch the program qubes-vpn-configurator on the VPN VM (this will be easy to do if you added the Qubes VPN configurator program to the menu of your VPN VM). This program will let you edit your VPN configuration and help you place any credential files in the right places. Once you are done, save the file and close the editor. At this point, the VPN should start running in the VPN VM. You can troubleshoot the VPN service by looking at the output of sudo journalctl -fab on your VPN VM in real time.
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page