mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2024-12-27 16:29:28 -05:00
a09ec964ad
This requires the user only to add a few lines to their ovpn config file, and copy a few scripts (verbatim). They do not have to figure out which IP addresses are appropriate and hard-code them--unless their VPN service is bereft of domain names. Even in that case, they can do it easily within the ovpn config file. This is much less error-prone and should work with a greater variety of services (large commercial services tend to change their IPs so using domain names and DHCP is preferable in that case). Also converted firewall section (3) to one code block for much less cutting/pasting. Comments are still there as shell comments. The only required template changes are adding openvpn itself and possibly disabling the default systemd service for it. Everything else should be there in /rw/config. This doesn't include extra firewall protections against inadvertent net access from within the VPN VM. I'm thinking of proposing those additions in a separate edit. |
||
---|---|---|
.. | ||
assigning-devices.md | ||
config-files.md | ||
disk-trim.md | ||
external-audio.md | ||
external-device-mount-point.md | ||
fetchmail.md | ||
http-filtering-proxy.md | ||
managing-vm-kernel.md | ||
multiboot.md | ||
mutt.md | ||
network-bridge-support.md | ||
network-printer.md | ||
postfix.md | ||
resize-disk-image.md | ||
resize-root-disk-image.md | ||
rxvt.md | ||
salt.md | ||
secondary-storage.md | ||
vpn.md | ||
zfs.md |