Default app qubes (work, personal, untrusted) have hardcoded netvm (instead of default) #9175
Labels
affects-4.2
This issue affects Qubes OS 4.2.
C: installer
diagnosed
Technical diagnosis has been performed (see issue comments).
P: default
Priority: default. Default priority for new issues, to be replaced given sufficient information.
pr submitted
A pull request has been submitted for this issue.
r4.2-host-stable
r4.3-host-cur-test
T: bug
Type: bug report. A problem or defect resulting in unintended behavior in something that exists.
How to file a helpful issue
Qubes OS release
4.2.1 (tried on fresh install)
Brief summary
Default app qubes like
work
havesys-firewall
set as the default netvm. This means that if the user wants to set a VPN qube as the default netvm, the default VMs will not take in this new setting, potentially leading to opsec mistakes.Steps to reproduce
Expected behavior
Net qube is set to
sys-firewall (default)
for those app qubes.Actual behavior
Net qube is set to
sys-firewall
instead ofsys-firewall (default)
The text was updated successfully, but these errors were encountered: