Merge pull request #117 from CrsiX/split-ssh-policy-fix

Added the missing policy/ directory in the dom0 setup description for Split SSH
This commit is contained in:
awokd 2021-02-06 14:17:30 +00:00 committed by GitHub
commit d139d1d9f6
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -112,12 +112,12 @@ If you still want to encrypt your keys you must refer to the [Securing Your Priv
To control which VM is allowed as a client, which may act as the server and how we want this interaction to happen, we have to write a policy file for qrexec in `dom0`. To control which VM is allowed as a client, which may act as the server and how we want this interaction to happen, we have to write a policy file for qrexec in `dom0`.
1. Create and edit `/etc/qubes-rpc/qubes.SshAgent`. 1. Create and edit `/etc/qubes-rpc/policy/qubes.SshAgent`.
- Open the file with e.g. `nano`. - Open the file with e.g. `nano`.
```shell_prompt ```shell_prompt
[user@fedora-32 ~]$ sudo nano /etc/qubes-rpc/qubes.SshAgent [user@fedora-32 ~]$ sudo nano /etc/qubes-rpc/policy/qubes.SshAgent
``` ```
- If you want to explicitly allow only this connection, add the following line: - If you want to explicitly allow only this connection, add the following line: