-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
On Tue, Aug 04, 2015 at 06:45:37PM -0500,
sur...@vfemail.net wrote:
>
> Thanks for your clear and detailed answer. I'd like to confirm a few points.
>
> 1. No VM is able to access outside network (through sys-net or otherwise)
> unless it has a NetVM defined explicitly.
Yes.
> The Update Proxy allows you to
> connect ANY Net or Proxy VM to ANY (App,Template,Standalone) VM and give it
> access to ONLY the repositories.
Not sure what you've meant here. The 'Allow connections to update proxy'
means:
IF the VM (template VM, standalone VM, anything) is connected
(directly or indirectly) to a VM providing an "updates proxy" service,
THEN the service can be used to access updates repositories, only.
Even when default policy for that VM is to block all the traffic.
But if such VM isn't connected to any VM providing such service (for
example not connected to any netvm at all), updates proxy will not be
available, even if 'Allow connections to update proxy' is enabled.
We may change that in the (far) future [1]. If that happens, there will
be clear indication of that.
[1]
https://github.com/QubesOS/qubes-issues/issues/806
> The important point is that using the
> 'Allow connections to update proxy' option, allows you to also enable 'Deny
> network access...' for all other traffic.
Exactly.
> (If this is true, then my
> TemplateVMs must have obtained updates in the background BEFORE I
> disconnected their NetVMs - source of my confusion. Also, the 'Updates
> pending!' icon seems to be bugged...)
>
>
> >You can have ANY ProxyVM working as an update proxy.
> >If you want updates running over tor, then set up a VM to act as proxy
> >with torVM as its NetVM, and put your templates with that VM as the
> >NetVM.
> >ie TemplateVM - proxyVM - torVM - sysnet
>
>
> 2. Do all ProxyVMs have the Update Proxy service enabled by default? (Guess
> that would be qubes-yum-proxy).
Not ProxyVMs, NetVMs. Yes, all of them have Updates Proxy service
enabled by default. 'qubes-yum-proxy' is an deprecated name, current one
is 'qubes-updates-proxy'.
> Also, yum-proxy-setup is enabled
> automatically in client VM's when the 'Allow connections to update proxy'
> option is enabled?
Yes, exactly. The 'yum-proxy-setup' (actually 'updates-proxy-setup')
option is responsible for setting yum/apt to actually use the updates
proxy.
> >Finally, you don't say how you set Firewall rules in an appVM - if you
> >set them in the GUI or at dom0 command line then this is clearly a bug
> you
> >should report at qubes-issues.
> >
> >unman
>
>
> Pretty certain that this resolved my issue: qvm-firewall error after
> renaming vm
> (
https://groups.google.com/forum/?hl=en#!topic/qubes-users/BL3Caxd6ejk)
BTW qubes-core-dom0-3.0.18 is already uploaded to testing repository.
- --
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQEcBAEBCAAGBQJVwowQAAoJENuP0xzK19csIl4H/RsBq4KMFohXeUAlKlS7UvLh
mDueS6CVWuwqcfyAp/7qbwIlOSSRiCk4jyEBfUft2Z1MixkosR4Ule+ulSbfwop2
56+CmSSEsgXz9PIG9lgqFsP6y2EzXl3ZBtgsUh1rE+VJfQzhkDaJ2h1gRtUZXB/x
pyBk0yIeRBk6DzWLgSyTp4GjXlcl0vTrvbYSsc/MlI23QXHMiIr7Wy2Jty166cO/
wZJpvBNW0Jw0eexB+hAo9yCBhz7bn9+knyiW5qQVO7kCHNAXPwY/WT78ojd8WdpD
smcrVYY/Sd7FcC7VjPhTLuCDJWcW8+yi51VsViYHQOvG+SP0UiaIlVpD2kQLU7c=
=T/gW
-----END PGP SIGNATURE-----