From c0e5501f5536ca8c1153dd81ecd26e8bb07cbe9c Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Marek=20Marczykowski-G=C3=B3recki?= Date: Sat, 18 Nov 2017 02:44:40 +0100 Subject: [PATCH] Enable qubes-firewall also in "NetVM" In some cases it may make sense to enfoce outgoing firewall also on sys-net. If the service is disabled, firewall settings will be (silently) ignored, so better be on the safe side and enable. QubesOS/qubes-issues#3290 --- vm-systemd/qubes-sysinit.sh | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/vm-systemd/qubes-sysinit.sh b/vm-systemd/qubes-sysinit.sh index 01bf9f5..ef74eff 100755 --- a/vm-systemd/qubes-sysinit.sh +++ b/vm-systemd/qubes-sysinit.sh @@ -5,7 +5,7 @@ . /usr/lib/qubes/init/functions # List of services enabled by default (in case of absence of qubesdb entry) -DEFAULT_ENABLED_NETVM="network-manager qubes-network qubes-update-check qubes-updates-proxy meminfo-writer" +DEFAULT_ENABLED_NETVM="network-manager qubes-network qubes-update-check qubes-updates-proxy meminfo-writer qubes-firewall" DEFAULT_ENABLED_PROXYVM="qubes-network qubes-firewall qubes-update-check meminfo-writer" DEFAULT_ENABLED_APPVM="cups qubes-update-check meminfo-writer" DEFAULT_ENABLED_TEMPLATEVM="$DEFAULT_ENABLED_APPVM updates-proxy-setup"