On Wed, Jan 11, 2017 at 06:43:31PM +0100, john.david.r.smith wrote: > On 11/01/17 18:37, 'Repairing' via qubes-users wrote: > >There's no problem to connect to the internet with domains: > >anon-whonix > >personal > >untrusted > > > >But i need to connect through templates: > >fedora > >debian > > > >There's no connection, white blank screen when i use firefox, how i can > >connect to the firefox with templates? > > > > first you should not do this. > its a security issue (hence it is disabled). > if something owns the firefox in the template, all vms based on that > template are owned. > why do you want to do this? > > how to enable access: > settings -> firewall rules -> allow full access for 5 min -> ok >
I'd recommend you read the documentation on this and weigh up what you are doing. There's little point in having Qubes if you are going to use it in ways that negate the security it aims for. www.qubes-os.org/doc/software-update-vm is an excellent guide - try reading it. templates *do* have internet access by default. It is restricted to access via an upstream proxy which provides some filtering. This enables you to use tools to install software without opening full access. You CAN open up the firewall as suggested. But you should be aware that there is a critical bug that often means that that access is not closed off at the end of the 5 mins. An alternative approach would be to download whatever files or packages you want in a dispVM nd then copy them to the template and install them locally. But I really would suggest that you take a little while to read and understand what Qubes offers and how it works before launching in. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20170111181921.GA23541%40thirdeyesecurity.org. For more options, visit https://groups.google.com/d/optout.