iptables-restore --noflush < /rw/config/iptables
18.12.2014, 11:56, "cprise" <cpr...@gmail.com>:
Hi! Thank you very much for your reply.
It seems that the more I read about this, the more confused I get, LOL!
I was reading at /etc/rc.d/init.d/README that this system uses the new systemd.
I'm not familiar with it, but apparently, you can see all the services/scripts run at startup running systemctl.
Did that and I see that qubes-firewall.service has a "failed". It was my script at qubes-firewall-user-script that generated that error, if I disable execution for that, the error goes away.
Anyway, I thank you for the details about over writing the dynamically generated config, I'm sure that would be an issue.
But I first need to be able to get ANY configuration into iptables on boot reliably.
I even tried having an rc.local script at /rw/config that just runs:
sudo services iptables stop
sudo services iptables start
That, if run manually, replaces the lines sent by qubes to some of my own, that will obviously be faulty, but the point if that manually work but automatically doesn't.
Anyone has any ideas?
I'm thinking the sanest thing might be to create an AppVM or a NetVM and manually make it a proxy using iptables.