These instruction should be done in the **template** qube (i.e. debian-11).
| These instructions should be done in the **template** qube (i.e. debian-11).
|
Create `/lib/systemd/system/qubes-ssh-forwarder.socket` (note that `ConditionPathExists` exists in unman's source, but is removed here):
| Create `/lib/systemd/system/qubes-ssh-forwarder.socket` (note that `ConditionPathExists` is in unman's source, but is removed here):
|
To make sure that users aren't able to access files outside of their directories, it's important to configure `chroot`:
| To make sure that client qubes aren't able to access files outside of their directories, it's important to configure `chroot`:
|
Append these lines to `/etc/qubes/policy.d/30-user.policy` in **dom0**:
| Append this to `/etc/qubes/policy.d/30-user.policy` in **dom0**:
|