From c6cade4f92ab1526ec7f56dcaf0a5381dc028b4e Mon Sep 17 00:00:00 2001 From: Crsi Date: Fri, 5 Feb 2021 00:39:40 +0100 Subject: [PATCH] Added the missing policy/ directory in the dom0 setup description See https://www.qubes-os.org/doc/qrexec/#policy-files for more info. --- docs/configuration/split-ssh.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/docs/configuration/split-ssh.md b/docs/configuration/split-ssh.md index 64dd937..07fe7f1 100644 --- a/docs/configuration/split-ssh.md +++ b/docs/configuration/split-ssh.md @@ -112,12 +112,12 @@ If you still want to encrypt your keys you must refer to the [Securing Your Priv To control which VM is allowed as a client, which may act as the server and how we want this interaction to happen, we have to write a policy file for qrexec in `dom0`. -1. Create and edit `/etc/qubes-rpc/qubes.SshAgent`. +1. Create and edit `/etc/qubes-rpc/policy/qubes.SshAgent`. - Open the file with e.g. `nano`. ```shell_prompt - [user@fedora-32 ~]$ sudo nano /etc/qubes-rpc/qubes.SshAgent + [user@fedora-32 ~]$ sudo nano /etc/qubes-rpc/policy/qubes.SshAgent ``` - If you want to explicitly allow only this connection, add the following line: