qusal/salt/sys-mirage-firewall
Ben Grande 422b01e0f6 feat: remove audiovm setting when unnecessary
Decrease audio attack surface to qubes that will never need to use it.
2024-01-20 19:34:39 +01:00
..
create.sls feat: remove audiovm setting when unnecessary 2024-01-20 19:34:39 +01:00
create.top refactor: initial commit 2023-11-13 14:33:28 +00:00
init.top refactor: initial commit 2023-11-13 14:33:28 +00:00
README.md feat: disposable mirage firewall 2024-01-12 17:58:56 +01:00

sys-mirage-firewall

Mirage Firewall in Qubes OS.

Table of Contents

Description

Creates a Mirage Firewall qube named "disp-sys-mirage-firewall". It is an OCaml program compiled to run as an operating system kernel, in this case, a MirageOS unikernel replacement for the default firewall (sys-firewall). It pulls in just the code it needs as libraries.

Contrary to a standard Linux Firewall, Mirage Firewall doesn't need a full system to run an excessive resources.

You can't use Mirage Firewall to be the updatevm, use another qube instead.

Installation

We have built the Unikernel locally and verified that the upstream checksum and local checksum matched when comparing the same release.

  • Top
qubesctl top.enable sys-mirage-firewall
qubesctl state.apply
qubesctl top.disable sys-mirage-firewall
  • State
qubesctl state.apply sys-mirage-firewall.create

Usage

As a started, set qubes netvm to disp-sys-mirage-firewall:

qvm-prefs --set QUBE netvm disp-sys-mirage-firewall

To test the firewall, apply rules with qvm-firewall.

For monitoring, inspect the Unikernel console:

sudo xl console disp-sys-mirage-firewall

Exit the console with Ctrl-].

Credits