qubes-vpn | Leakproof VPN for your Qubes OS system | VPN library

 by   Rudd-O Shell Version: Current License: No License

kandi X-RAY | qubes-vpn Summary

kandi X-RAY | qubes-vpn Summary

qubes-vpn is a Shell library typically used in Networking, VPN applications. qubes-vpn has no bugs, it has no vulnerabilities and it has low support. You can download it from GitHub.

This package allows you to set up a leakproof OpenVPN VM on your Qubes OS system. All VMs attached to the VPN VM are automatically and transparently routed through the VPN. DNS requests do not hit the NetVM — they get routed through the VPN instead. Connection and disconnection events are notified using the desktop notification system. When the VPN connection is lost, traffic is automatically blackholed without any intervention. All system state changes during VPN operation are (a) volatile (b) minimal (c) non-interfering with normal Qubes OS ProxyVM operation.
Support
    Quality
      Security
        License
          Reuse

            kandi-support Support

              qubes-vpn has a low active ecosystem.
              It has 54 star(s) with 8 fork(s). There are 3 watchers for this library.
              OutlinedDot
              It had no major release in the last 6 months.
              There are 8 open issues and 2 have been closed. On average issues are closed in 1 days. There are no pull requests.
              It has a neutral sentiment in the developer community.
              The latest version of qubes-vpn is current.

            kandi-Quality Quality

              qubes-vpn has 0 bugs and 0 code smells.

            kandi-Security Security

              qubes-vpn has no vulnerabilities reported, and its dependent libraries have no vulnerabilities reported.
              qubes-vpn code analysis shows 0 unresolved vulnerabilities.
              There are 0 security hotspots that need review.

            kandi-License License

              qubes-vpn does not have a standard license declared.
              Check the repository for any license declaration and review the terms closely.
              OutlinedDot
              Without a license, all rights are reserved, and you cannot use the library in your applications.

            kandi-Reuse Reuse

              qubes-vpn releases are not available. You will need to build from source code and install.
              Installation instructions, examples and code snippets are available.

            Top functions reviewed by kandi - BETA

            kandi's functional review helps you automatically verify the functionalities of the libraries and avoid rework.
            Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of qubes-vpn
            Get all kandi verified functions for this library.

            qubes-vpn Key Features

            No Key Features are available at this moment for qubes-vpn.

            qubes-vpn Examples and Code Snippets

            No Code Snippets are available at this moment for qubes-vpn.

            Community Discussions

            QUESTION

            How can I get "sudo chmod +x my_script.sh" to work? (operation not permitted) (Fedora 30)
            Asked 2020-Feb-22 at 08:10

            I am attempting to make a file my_script.sh executable by using the sudo chmod +x my_script.sh command. I created the file my_script.sh with sudo gedit my_script.sh I did my writing in the file, then I used chattr +i /etc/resolv.conf to save the change. I then attempted the sudo chmod +x my_script.sh command, but received the output chmod: changing permissions of '/rw/config/vpn/qubes-vpn-handler.sh': Operation not permitted. I've looked all over the web and on these forums and have found a number of posts offering solutions about changing ownership, etc. However, these all meet with the same result. I'm including some examples below, in case they're helpful:

            ...

            ANSWER

            Answered 2020-Feb-22 at 08:10

            It is because of the chattr +i have a look at the man page : https://linux.die.net/man/1/chattr.

            It prevents any user including the root from modifying or deleting a file. You can do chattr -i to change that.

            Source https://stackoverflow.com/questions/60350194

            Community Discussions, Code Snippets contain sources that include Stack Exchange Network

            Vulnerabilities

            No vulnerabilities reported

            Install qubes-vpn

            To install the software:.
            Clone this repository.
            Make the RPM on the folder of your clone make rpm
            Copy the RPM to your Qubes OS template: qvm-copy-to-vm fedora-23 /path/to/qubes-vpn*.noarch.rpm
            Install the RPM on the template: dnf install /path/to/qubes-vpn*.noarch.rpm
            Power off the template.
            Launch the program qubes-vpn-configurator on the VPN VM (this will be easy to do if you added the Qubes VPN configurator program to the menu of your VPN VM). This program will let you edit your VPN configuration and help you place any credential files in the right places. Once you are done, save the file and close the editor. At this point, the VPN should start running in the VPN VM. You can troubleshoot the VPN service by looking at the output of sudo journalctl -fab on your VPN VM in real time.

            Support

            Within the VPN VM:. will give you diagnostic information. You can also observe the log of the system in realtime with sudo journalctl -fab as it attempts to connect or disconnect. If you need more debugging information, you can make the VPN interface control script spit large amounts of information by creating the file /var/run/qubes-vpn/debug and restarting qubes-vpn.service while looking at the journalctl -fab output. File issues on this project if you could not get it to work, or there are errors in the software or the documentation.
            Find more information at:

            Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items

            Find more libraries
            CLONE
          • HTTPS

            https://github.com/Rudd-O/qubes-vpn.git

          • CLI

            gh repo clone Rudd-O/qubes-vpn

          • sshUrl

            git@github.com:Rudd-O/qubes-vpn.git

          • Stay Updated

            Subscribe to our newsletter for trending solutions and developer bootcamps

            Agree to Sign up and Terms & Conditions

            Share this Page

            share link

            Explore Related Topics

            Consider Popular VPN Libraries

            algo

            by trailofbits

            streisand

            by StreisandEffect

            brook

            by txthinking

            Try Top Libraries by Rudd-O

            qubes-network-server

            by Rudd-OPython

            ledgerhelpers

            by Rudd-OPython

            zfs-tools

            by Rudd-OPython

            ansible-qubes

            by Rudd-OPython

            curvetls

            by Rudd-OGo