-
Notifications
You must be signed in to change notification settings - Fork 26
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support for multiple VPN connections #15
Comments
Vpn-support adds no routing itself -- it places restrictions based on the layer below: interfaces -- so for routing you'll need to focus on the default Qubes configuration (which relies on It sounds like your multiple connections will be simultaneous. If so, you may prefer to use the Debian openvpn service files, which already use %i instances and can accommodate server/router configurations. Once your services/links are up, adapting the firewall script for your case should be straightforward. |
Understood about the routes -- I can finagle it to work fine with multiple VM's but I wasn't sure if this was in the scope of the project to support out of the box (IE: load up multiple OpenVPN instances + setup the firewall rules for said instances). If not please feel free to close this issue. If I add anything worthwhile I'll shoot you a PR. Cheers! |
This is the first time I've had an inquiry about multiple instances. But I'd still say its in scope because the project is basically route-agnostic... that is left to the vpn configs. I'd be interested to get a PR for this. |
I'll see if I can make a PoC of this however I have a use case where I'd make a
workVPN
ProxyVM which would connect to various L2 OpenVPN instances.An example use case would be something along these lines:
The firewall portion should be achievable by either plopping the adjusted iptables rules in
/rw/config/rc.local
or/rw/config/qubes-firewall.d
.This should be relatively easy to achieve by looping over a configuration directory (IE:
/rw/config/vpn/openvpn.conf.d/*
) and starting various OpenVPN instances. Modifying the systemd service file to support numerous OpenVPN instances (IE: using %i) would make this relatively clean.I need to dive more into how you're handling the firewalling / routing to see how feasible / easy this change would be and if it fits the scope of your project. If not I'll fork this and adjust it for the use case outlined above.
The text was updated successfully, but these errors were encountered: