Mullvad - update specfile

This commit is contained in:
unman 2024-04-19 15:11:45 +00:00
parent 389594f08c
commit 65155ea323
No known key found for this signature in database
GPG Key ID: FDD1B8244731B36C
2 changed files with 65 additions and 1 deletions

View File

@ -1,6 +1,6 @@
Name: 3isec-qubes-mullvad-vpn
Version: 2023.6
Release: 2%{?dist}
Release: 3%{?dist}
Summary: Set up a Mullvad qube and disposable template
License: GPLv3+
@ -48,6 +48,8 @@ if [ $1 -eq 1 ]; then
qubesctl --skip-dom0 --targets=template-mullvad state.apply mullvad.browser
qubesctl state.apply mullvad.create_disposable
qubesctl --skip-dom0 --targets=sys-mullvad state.apply mullvad.configure
elif [ $1 -eq 1 ]; then
qubesctl state.apply mullvad.create_disposable
fi
%postun
@ -55,6 +57,10 @@ if [ $1 -eq 0 ]; then
fi
%changelog
* DATE DATE unman <unman@thirdeyesecurity.org> - 2023.6.3
- Update: include Mullvad Browser 13.0.13
- Add: log out from mullvad account on shutdown disposables.
- Fix: reset max ram to default 4000
* Sat Mar 16 2024 unman <unman@thirdeyesecurity.org> - 2023.6.2
- Update to include new Mullvad Browser
- Use sys-mullvad as transparent VPN proxy

58
mullvad/README_WIP Normal file
View File

@ -0,0 +1,58 @@
These salt states can be used to create a template, loaded with the MullvadVPN GUI and Mullvad Browser.
An AppVM named sys-mullvad, and a disposable template, mullvad-dvm, can be
created from that template.
The template, template-mullvad, is based on the debian-12-minimal template.
If the debian-12-minimal template is not present, it will be downloaded
and installed - this may take some time depending on your net connection.
Both the AppVM and the disposable template have the Mullvad GUI to
set up a VPN, and the Mullvad browser. You can run the Mullvad Browser
independently of the VPN.
The sys-mullvad AppVM can be used as a standard AppVM or as a vpn gateway
- set the netvm of client qubes to mullvad, and they will use the VPN. No
traffic will pass except through the VPN.
If you remove this package, the salt files will be removed, but the qubes will not.
You can manually remove them if you wish.
You can, of course, use template-mullvad to create other qubes for
separate VPN connections, or a qube where you will just use the Mullvad browser.
Remember that each qube that creates a VPN will count toward the maximum of 5 clients.
Log out and close the VPN when you have finished with it: if you do not,
you will be prompted to log out other clients from the GUI.
Installing the Template
-----------------------
sudo qubesctl state.apply mullvad.clone
sudo qubesctl --skip-dom0 --targets=template-mullvad state.apply mullvad.repo
Installing the Mullvad Browser
------------------------------
sudo qubesctl --skip-dom0 --targets=TARGETS state.apply mullvad.browser
(Replace TARGETS with the name(s) of the templates where you want to install
the browser.)
To create the
qubesctl state.apply mullvad.create_disposable
qubesctl --skip-dom0 --targets=sys-mullvad state.apply mullvad.configure
#####################################
%post
if [ $1 -eq 1 ]; then
qubesctl state.apply mullvad.clone
qubesctl --skip-dom0 --targets=template-mullvad state.apply mullvad.repo
qubesctl --skip-dom0 --targets=template-mullvad state.apply mullvad.browser
qubesctl state.apply mullvad.create_disposable
qubesctl --skip-dom0 --targets=sys-mullvad state.apply mullvad.configure
elif [ $1 -eq 1 ]; then
qubesctl state.apply mullvad.create_disposable
fi
#####################################