diff --git a/readme.lamuse b/readme.lamuse index 27aea0e..a85bda6 100644 --- a/readme.lamuse +++ b/readme.lamuse @@ -1,9 +1,7 @@ -Great work, Rudd-O! - changes to src/usr/lib64/python2.7/site-packages/qubes/modules/007FortressQubesProxyVm.py: If the server VM gets firewall rules besides of "allow all", those rules were only honored for outgoing traffic in the original code. -My code also creates rules for incoming traffic in the proxy VM and the server VM. +The changed code also creates rules for incoming traffic in the proxy VM and in the server VM. It may not be perfect, but it works for me. -My code is GPL, of course. +btw, code is GPL diff --git a/src/usr/lib64/python2.7/site-packages/qubes/modules/007FortressQubesProxyVm.py b/src/usr/lib64/python2.7/site-packages/qubes/modules/007FortressQubesProxyVm.py index 46335da..c403ee2 100644 --- a/src/usr/lib64/python2.7/site-packages/qubes/modules/007FortressQubesProxyVm.py +++ b/src/usr/lib64/python2.7/site-packages/qubes/modules/007FortressQubesProxyVm.py @@ -102,7 +102,7 @@ class QubesProxyVm(OriginalQubesProxyVm): ruletext += "/{0}".format(rule["netmask"]) if rule["proto"] is not None and rule["proto"] != "any": - ruletext += " -p {0}".format(rule["proto"]), fuer + ruletext += " -p {0}".format(rule["proto"]) if rule["portBegin"] is not None and rule["portBegin"] > 0: ruletext += " --dport {0}".format(rule["portBegin"]) if rule["portEnd"] is not None and rule["portEnd"] > rule["portBegin"]: