Use qubes-sync with multiple clients and one server revisions

Go back to topic: Use qubes-sync with multiple clients and one server

  1. v4 anchor; v4 full version
  2. v3 anchor; v3 full version
  3. v2 anchor; v2 full version

Revision #4

Edited on
2023-07-13
Edited by user
Marisoc
## Start qubes-sync automatically Append this to `/rw/config/rc.local` on **$SERVERNAME**. **This must come after all `useradd` commands**: ```sh bash -c "sleep 10 && systemctl restart sshd" ``` Append this to `/rw/config/rc.local` on **$CLIENTNAME**: ```sh systemctl start qubes-ssh-forwarder.socket sudo -H -u user -i sshfs -p 840 sync-$CLIENTNAME@localhost:/writable /home/user/sync ```

Revision #3

Edited on
2023-07-13
Edited by user
Marisoc

Revision #2

Edited on
2023-07-11
Edited by user
Marisoc
These instruction should be done in the **template** qube (i.e. debian-11). These instructions should be done in the **template** qube (i.e. debian-11).
Create `/lib/systemd/system/qubes-ssh-forwarder.socket` (note that `ConditionPathExists` exists in unman's source, but is removed here): Create `/lib/systemd/system/qubes-ssh-forwarder.socket` (note that `ConditionPathExists` is in unman's source, but is removed here):
To make sure that users aren't able to access files outside of their directories, it's important to configure `chroot`: To make sure that client qubes aren't able to access files outside of their directories, it's important to configure `chroot`:
Append these lines to `/etc/qubes/policy.d/30-user.policy` in **dom0**: Append this to `/etc/qubes/policy.d/30-user.policy` in **dom0**: