From fbb52ec4bc2ad9d14c1f6a6aba126d2b00bf2590 Mon Sep 17 00:00:00 2001 From: Giulio Date: Fri, 25 Jun 2021 16:36:15 +0200 Subject: [PATCH] Fixed list maybe? --- Readme.md | 11 ++++++----- 1 file changed, 6 insertions(+), 5 deletions(-) diff --git a/Readme.md b/Readme.md index eeffcb5..ce0587f 100644 --- a/Readme.md +++ b/Readme.md @@ -149,18 +149,19 @@ It is important to note that in the last case, it is just a standard case of int ### Implementation Roadmap - * ✔️ In `core-admin-client/qubesadmin/firewall.py` firewall.py > The code + 1. ✔️ In `core-admin-client/qubesadmin/firewall.py` firewall.py > The code needs to support the new options for the rule (action=forward frowardtype= srcports=443-443 srchosts=0.0.0.0/0 - * ✔️ In `core-admin/qubes/firewall.py` -> The code needs to support the same + 2. ✔️ In `core-admin/qubes/firewall.py` -> The code needs to support the same options as the point above - * 🚧 In `core-admin/qubes/vm/mix/net.py` -> The most important logic goes + 3. 🚧 In `core-admin/qubes/vm/mix/net.py` -> The most important logic goes here. Here there is the need to resolve the full network chain for external port forwarding. From here it is possible to add the respective rules to the QubesDB of each NetVM in he chain and trigger a reload event. - * ❌ In `core-agent-linux/qubesagent/firewall.py` -> Here goes the logic for + 4. ❌ In `core-agent-linux/qubesagent/firewall.py` -> Here goes the logic for building the correct syntax for iptables or nft and the actual execution - * ❌ GUI + 5. ❌ GUI + ### Required rules