Route qube traffic transparently through a proxy qube (Qubes R4.1 and R4.2) revisions

Go back to topic: Route qube traffic transparently through a proxy qube (Qubes R4.1 and R4.2)

  1. v3 anchor; v3 full version
  2. v2 anchor; v2 full version

Revision #3

Edited on
2023-07-17
Edited by user
lovemesomesocks5
#### For Qubes 4.1 #### For Qubes R4.1
#### For Qubes 4.2 USERS #### For Qubes R4.2

Revision #2

Edited on
2023-07-17
Edited by user
lovemesomesocks5
#### end of Qubes version specific instructions #### End of Qubes version specific instructions
* `clash`, the proxy client used, also supports other proxy protocols such as Shadowsocks in addition to SOCKS5 and HTTP(S), see [their documentation](https://dreamacro.github.io/clash/configuration/outbound.html#proxies) for more details * `dnscrypt-proxy`, the DNS client used, is being used with a minimal configuration that has two preconfigured DNS servers: Quad9's and Mullvad's DoH servers. You can also configure sources for lists of DNS servers, but make sure to preserve the custom configuration in our `dnscrypt-proxy.toml` file (before `[static]`). See their [documentation](https://github.com/DNSCrypt/dnscrypt-proxy/wiki) and [example config file](https://github.com/DNSCrypt/dnscrypt-proxy/blob/master/dnscrypt-proxy/example-dnscrypt-proxy.toml) for details* `clash`, the proxy client used, also supports other proxy protocols such as Shadowsocks in addition to SOCKS5 and HTTP(S), see [their documentation](https://dreamacro.github.io/clash/configuration/outbound.html#proxies) for more details. * `dnscrypt-proxy`, the DNS client used, is being used with a minimal configuration that has two preconfigured DNS servers: Quad9's and Mullvad's DoH servers. You can also configure sources for lists of DNS servers, but make sure to preserve the custom configuration in our `dnscrypt-proxy.toml` file (before `[static]`). See their [documentation](https://github.com/DNSCrypt/dnscrypt-proxy/wiki) and [example config file](https://github.com/DNSCrypt/dnscrypt-proxy/blob/master/dnscrypt-proxy/example-dnscrypt-proxy.toml) for details. * It should be leak-proof, since `qvm-firewall` is used to block all traffic of all kinds from `sys-proxy` to any non-proxy IPs.