Blog
Using Docker in AppVMs in Qubes OS
Running Docker in a Qubes OS AppVM requires one extra step: making Docker state directories persistent across reboots.
…Killswitch for proxy/vpn
This discussion on Qubes OS forums goes into details of creating a proxy-vm. I suppose it would be beneficial to add a killswitch on top of this to prevent IP leaks in case of a proxy failure, or before the tun0 interface is fully initialized. Here’s how:
…Fixing DNS issues with .onion addresses
Some tools support delegation of services to a remote address, but sometimes they try to resolve DNS themselves using the local DNS resolver. The resolver would get an onion address and issue a DNS error because it doesn’t know how to resolve .onion, even if the machine itself is torified. You can use socat to create a local interface that binds a local port to an onion address, so that the tool won’t try to resolve the domain.
…Enabling VPN connections for Qubes OS firewall
Services like Tailscale and reverse shells won’t work until you relax the firewall to allow them… …
Creating reasonably secure remote administration for Qubes OS
This guide will help you create an authenticated service for managing Qubes OS remotely
By design it will be:
- Encrypted
- Authenticated (with a key)
- Over Tor
- Works behind NAT/CGNAT
- No open ports required
- Accessible from any computer with a Tor Browser / Tails / Whonix
- ← Prev
- 1 of 7
- Next →