core-agent-linux/network
Marek Marczykowski-Górecki 6139ed59a3
(redo) updates-proxy: explicitly block connection looping back to the proxy IP
Explicitly block something like "curl http://127.0.0.1:8082" and
return error page in this case. This error page is used in Whonix to
detect if the proxy is torrified. If not blocked, it may happen that
empty response is returned instead of error. See linked ticket for
details.

This was previously done for 10.137.255.254, but since migration to
qrexec-based connection, 127.0.0.1 is used instead.

Fixes QubesOS/qubes-issues#1482
2017-09-15 05:00:05 +02:00
..
00notify-hook Improved upgrade notifications sent to QVMM. 2015-11-11 15:45:00 +00:00
30-qubes-external-ip
80-qubes.conf install iptables/forwarding for debian 2014-09-29 05:25:14 +02:00
ip6tables network: rewrite qubes-firewall daemon 2016-09-12 05:22:53 +02:00
iptables network: rewrite qubes-firewall daemon 2016-09-12 05:22:53 +02:00
iptables-updates-proxy
network-manager-prepare-conf-dir network: Properly handle comments in NetworkManager.conf (#2584) 2017-03-28 17:19:12 -04:00
nm-30-qubes.conf Configure NetworkManager to keep /etc/resolv.conf as plain file 2016-09-15 01:26:35 +02:00
qubes-fix-nm-conf.sh Revert "network: use drop-ins for NetworkManager configuration (#1176)" 2015-11-28 17:43:15 +01:00
qubes-iptables removed trailing spaces 2015-10-15 04:34:55 +02:00
qubes-nmhook Clean up early initialization and setup of /rw 2016-10-23 20:19:51 +00:00
qubes-setup-dnat-to-ns If there is only 1 DNS server make both DNAT rules point to it 2017-03-19 21:56:34 +00:00
setup-ip
show-hide-nm-applet.desktop
show-hide-nm-applet.sh
tinyproxy-updates.conf
udev-qubes-network.rules
update-proxy-configs
updates-blacklist (redo) updates-proxy: explicitly block connection looping back to the proxy IP 2017-09-15 05:00:05 +02:00
vif-qubes-nat.sh
vif-route-qubes Merge branch 'core3-devel' 2017-05-20 14:43:53 +02:00