 715693b93d
			
		
	
	
		715693b93d
		
			
		
	
	
	
	
		
			
			If IPv6 is configured in the VM, and it is providing network to others, apply IPv6 firewall similar to the IPv4 one (including NAT for outgoing traffix), instead of blocking everything. Also, enable IP forwarding for IPv6 in such a case. Fixes QubesOS/qubes-issues#718
		
			
				
	
	
		
			22 lines
		
	
	
		
			749 B
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
			
		
		
	
	
			22 lines
		
	
	
		
			749 B
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
| etc/dhclient.d/qubes-setup-dnat-to-ns.sh
 | |
| etc/qubes-rpc/qubes.UpdatesProxy
 | |
| etc/qubes/ip6tables.rules
 | |
| etc/qubes/ip6tables-enabled.rules
 | |
| etc/qubes/iptables.rules
 | |
| etc/tinyproxy/tinyproxy-updates.conf
 | |
| etc/tinyproxy/updates-blacklist
 | |
| etc/udev/rules.d/99-qubes-network.rules
 | |
| etc/xen/scripts/vif-qubes-nat.sh
 | |
| etc/xen/scripts/vif-route-qubes
 | |
| lib/systemd/system/qubes-firewall.service
 | |
| lib/systemd/system/qubes-iptables.service
 | |
| lib/systemd/system/qubes-network.service
 | |
| lib/systemd/system/qubes-updates-proxy.service
 | |
| usr/lib/qubes/init/network-proxy-setup.sh
 | |
| usr/lib/qubes/init/qubes-iptables
 | |
| usr/lib/qubes/iptables-updates-proxy
 | |
| usr/lib/qubes/qubes-setup-dnat-to-ns
 | |
| usr/lib/qubes/setup-ip
 | |
| usr/lib/tmpfiles.d/qubes-core-agent-linux.conf
 | |
| usr/sbin/qubes-firewall
 |