On 2021-06-23 04:58, Sven Semmler wrote:
Hi @stumpy,
I don't know what your goals are exactly, but if you'd like a
debian-minimal based qube to connect to a OpenVPN than this will work
for sure:
Template (cloned from debian-minimal):
apt install qubes-repo-contrib
apt update
apt install qubes-tunnel openvpn qubes-core-agent-networking
Qube (based on above template)
Obviously provide netvm and set provides_network to true. Also
'qvm-service sys-vpn qubes-tunnel on'
Then inside the qube
/usr/lib/qubes/qtunnel-setup --config
and finally copy and rename the .ovpn file provided by your VPN
provider to /rw/config/qtunnel/qtunnel.conf
That's all there is. Restart the qube and be happy.
/Sven
--
public key: https://www.svensemmler.org/2A632C537D744BC7.asc
fingerprint: DA59 75C9 ABC4 0C83 3B2F 620B 2A63 2C53 7D74 4BC7
As usual thank you very much Sven!
I will give that a try this weekend.
As for my goals they are pretty simple for proxyvms at least, I wanted
to minimal templates that have a reduced attack surface, that I did not
have to update all the time (though of my goals this was the least
important so long as it was stable), and also a template i did not have
to change so often. As setting up vpn vms has never been smooth for me,
i am keen on using a distro like say centos or debian that i dont have
to worry about EOL too often.
Cheers
btw, anyone know if there are any plans to replace the centos template
with something like rocky linux? (or something that has a similarly long
life cycle?)
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit
https://groups.google.com/d/msgid/qubes-users/263d590defc485a2b419ed0f1a79d926%40posteo.net.