715693b93d
If IPv6 is configured in the VM, and it is providing network to others, apply IPv6 firewall similar to the IPv4 one (including NAT for outgoing traffix), instead of blocking everything. Also, enable IP forwarding for IPv6 in such a case. Fixes QubesOS/qubes-issues#718
22 regels
749 B
Plaintext
22 regels
749 B
Plaintext
etc/dhclient.d/qubes-setup-dnat-to-ns.sh
|
|
etc/qubes-rpc/qubes.UpdatesProxy
|
|
etc/qubes/ip6tables.rules
|
|
etc/qubes/ip6tables-enabled.rules
|
|
etc/qubes/iptables.rules
|
|
etc/tinyproxy/tinyproxy-updates.conf
|
|
etc/tinyproxy/updates-blacklist
|
|
etc/udev/rules.d/99-qubes-network.rules
|
|
etc/xen/scripts/vif-qubes-nat.sh
|
|
etc/xen/scripts/vif-route-qubes
|
|
lib/systemd/system/qubes-firewall.service
|
|
lib/systemd/system/qubes-iptables.service
|
|
lib/systemd/system/qubes-network.service
|
|
lib/systemd/system/qubes-updates-proxy.service
|
|
usr/lib/qubes/init/network-proxy-setup.sh
|
|
usr/lib/qubes/init/qubes-iptables
|
|
usr/lib/qubes/iptables-updates-proxy
|
|
usr/lib/qubes/qubes-setup-dnat-to-ns
|
|
usr/lib/qubes/setup-ip
|
|
usr/lib/tmpfiles.d/qubes-core-agent-linux.conf
|
|
usr/sbin/qubes-firewall
|