How-to use a custom qube proxy update revisions

Go back to topic: How-to use a custom qube proxy update

  1. v5 anchor; v5 full version
  2. v4 anchor; v4 full version
  3. v3 anchor; v3 full version
  4. v2 anchor; v2 full version

Revision #5

Edited on
2024-01-15
Edited by user
solene
# Setup # Setup in Qubes OS .42 with the GUI It's became easy to change the update proxy settings thanks to the new GUI. You can choose the default update proxy and also add exceptions, and you make sure you won't break anything :+1: ![Capture d’écran_2024-01-15_11-12-19|632x500](upload://knokJYpYaMPZkErxscLCwNycbX6.png) # Setup using command line

Revision #4

Edited on
2023-10-03
Edited by user
solene
In **dom0**, as root edit the file `/etc/qubes/policy.d/30-user.policy` (it shouldn't exist by default), it will override the default settings, add this content: In **dom0**, edit the file `/etc/qubes/policy.d/30-user.policy` (it shouldn't exist by default), it will override the default settings, add the following content to the file. Note that the Whonix lines are required if you plan to use whonix (qubes with tor).
# Upgrade Whonix TemplateVMs through sys-whonix. qubes.UpdatesProxy * @tag:whonix-updatevm @default allow target=sys-whonix # Deny Whonix TemplateVMs using UpdatesProxy of any other VM. qubes.UpdatesProxy * @tag:whonix-updatevm @anyvm deny # Your custom UpdateProxy

Revision #3

Edited on
2023-10-02
Edited by user
solene
In **dom0**, as root edit the file `/etc/qubes/policy.d/30-user.policy`, it will override the default settings, add this content: In **dom0**, as root edit the file `/etc/qubes/policy.d/30-user.policy` (it shouldn't exist by default), it will override the default settings, add this content:

Revision #2

Edited on
2023-10-02
Edited by user
solene