-
-
Notifications
You must be signed in to change notification settings - Fork 52
Description
Qubes OS release
R4.2
Brief summary
Some users are shooting their own feet by setting the Net Qube of anon-whonix to sys-firewall. See this example.
There should be some protection in place in QVMM or otherwise to prevent this.
Steps to reproduce
- configure the Net Qube of
anon-whonixto besys-firewall curl.anondist-orig 1.1.1.1
Expected behavior
simplified:
Not possible to change anon-whonix to any VM other than sys-whonix as Net Qube.
formalized:
Prohibited by QVMM to change a VM with the anon-vm qvm-tag to use a VM without the anon-gateway qvm-tag.
(I wouldn't be opposed to this being only a warning that the user can choose to ignore. But that part does not seem important. That part could remain "patches welcome".)
Actual behavior
Functional networking. IP leak.
Additional information
Whonix for VirtualBox does not have the issue of new users being able to reconfigure this. While possible for advanced users, not something as simple as point and click as it can be done with Qubes. Details here: #3994 (comment)