diff --git a/content/posts/qubes/Using IVPN on Qubes OS/index.md b/content/posts/qubes/Using IVPN on Qubes OS/index.md index f4ab2b6..a2d1af0 100644 --- a/content/posts/qubes/Using IVPN on Qubes OS/index.md +++ b/content/posts/qubes/Using IVPN on Qubes OS/index.md @@ -99,7 +99,7 @@ sudo shutdown now Create an AppVM based on the TemplateVM you have just created. Set `sys-firewall` (or whatever FirewallVM you have connected to your `sys-net`) as the net qube. If you do not have such FirewallVM, use `sys-net` as the net qube. Next, go to the advanced tab and tick the `provides network access to other qubes` box. -![Provides Network](/images/provides-network.png) +![Provides Network](provides-network.png) Open the IVPN and select `Settings` → `DNS` → `Force management of DNS using resolv.conf`. diff --git a/static/images/provides-network.png b/content/posts/qubes/Using IVPN on Qubes OS/provides-network.png similarity index 100% rename from static/images/provides-network.png rename to content/posts/qubes/Using IVPN on Qubes OS/provides-network.png diff --git a/content/posts/qubes/Using Mullvad VPN on Qubes OS/index.md b/content/posts/qubes/Using Mullvad VPN on Qubes OS/index.md index 3178854..944ef3a 100644 --- a/content/posts/qubes/Using Mullvad VPN on Qubes OS/index.md +++ b/content/posts/qubes/Using Mullvad VPN on Qubes OS/index.md @@ -82,7 +82,7 @@ sudo shutdown now Create an AppVM based on the TemplateVM you have just created. Set `sys-firewall` (or whatever FirewallVM you have connected to your `sys-net`) as the net qube. If you do not have such FirewallVM, use `sys-net` as the net qube. Next, go to the advanced tab and tick the `provides network access to other qubes` box. -![Provides Network](/images/provides-network.png) +![Provides Network](provides-network.png) Open the Mullvad VPN app. Go to `Settings` → `VPN settings` and toggle `Local network sharing`. Due to some strange interaction between qubes services and Mullvad VPN, certain apps will get internet connections while others do not if this toggle is not enabled. This toggle will **not** actually allow AppVMs connected to the ProxyVM to connect to the local network. diff --git a/content/posts/qubes/Using Mullvad VPN on Qubes OS/provides-network.png b/content/posts/qubes/Using Mullvad VPN on Qubes OS/provides-network.png new file mode 100644 index 0000000..ff46f33 Binary files /dev/null and b/content/posts/qubes/Using Mullvad VPN on Qubes OS/provides-network.png differ