![]() YTMMV (Your threat model may vary )īut for others coming across the thread it’s useful to know the security implications. It’s informative and I’m sure what a lot of people want. Maybe I forgot something, so please try it out and let me know how it went.Ībsolutely, I wasn’t criticising your answer. rpm directly to standalone appvm, and no need to configure bind-dirs), but with this procedure you can create more VPN appvm’s that can run at the same time, all deriving from the common template mullvad-template. You could make the appvm as standalone (skipping the template creation, and installing. Now you can assign this new network-providing appvm to any client you want to use VPN. Probably some network interface issue, not related to Qubes / Linux. When I tried this, both wireguard and openvpn worked, but for me the wireguard hangs every now and then. Click “Lauch app on start-up” in the Preferences. In the appvm, start the GUI /opt/Mullvad VPN/mullvad-gui.In the appvm, configure bind-dirs for /etc/mullvad-vpn as explained here.In the services tab, add network-service with the + button. In the Advanced tab, click “provides networking”. ![]() Nothing special here, just normal appvm based on mullvad-template in this example.
0 Comments
Leave a Reply. |