core-admin/qubes-rpc-policy/qubes.ConnectTCP.policy

11 lines
460 B
Plaintext
Raw Normal View History

2019-08-08 12:28:30 +02:00
## Note that policy parsing stops at the first match,
## so adding anything below "$anyvm $anyvm action" line will have no effect
## Please use a single # to start your custom comments
# WARNING: The qubes.ConnectTCP service is dangerous and allows any
# qube to access any other qube TCP port. It should be restricted
# only to restricted qubes. This is why the default policy is 'deny'
# Example of policy: mytcp-client @default allow,target=mytcp-server