[HOME] [DOWNLOAD] [DOCS] [NEWS] [SUPPORT] [TIPS] [ISSUES] [CONTRIBUTE] [DONATE]

Qubes - SSH (soon VNC) into Qubes dom0 - Testers Wanted!

Encrypted, authenticated SSH or VNC into Qubes dom0 over an authenticated Tor onion v3 service.

Only available in Qubes R4.1 and above.

User documentation:
https://www.whonix.org/wiki/Remote_Administration#Qubes_-_SSH_or_VNC_into_Qubes_dom0

Source code:
https://github.com/QubesOS/qubes-remote-support

Development notes:
https://www.whonix.org/wiki/Dev/Qubes_Remote_Support

Qubes ticket:
https://github.com/QubesOS/qubes-issues/issues/6364

Qubes repository upload status:
https://github.com/QubesOS/updates-status/issues/2353

x2go (VNC) support broken until upstream fix for issue flows to Qubes R4.1 dom0:
https://github.com/QubesOS/updates-status/issues/2353

Qubes mailing list discussion:
https://groups.google.com/d/msgid/qubes-users/176bd8b8-ade0-3a60-1b12-f168719293a1%40whonix.org

Credits:
This has been a shared project among Qubes and Whonix project.

  • conceptual planning: Patrick Schleizer, Whonix, Marek Marczykowski-Górecki, Qubes OS, Insurgo
  • command line backend utilities, Whonix integration: Patrick Schleizer, Whonix
  • graphical user interface (GUI), Qubes Remote Support GUI: Marta Marczykowska-Górecka (Qubes OS)

Gratitude is expressed to NLnet for funding this functionality as part of accessible security project!

[Imprint] [Privacy Policy] [Cookie Policy] [Terms of Use] [E-Sign Consent] [DMCA] [Contributors] [Investors] [Priority Support] [Professional Support]