Thanks again @solene for this similar with Proton VPN I could not get this to work in Debian 13, but succeeded with a Fedora 42 Template, except instead of
I installed the Mullvad App in the Fedora 42 Template and made the sys-mullvad-app be the Service Qube. At first I kept having DNS issues in the App Qube, but that was because I overlooked this line:
Perhaps re-phrasing this as sudo dnf install inotify-tools would save some people (like me ) time in accidentally missing things?
Everything seemed to work except for saving of the account login code, but after doing this suggested fix, it saves the login code.
With the latest release of the Mullvad app it appaers they have removed ability to select a port to connect to on the Wireguard server. Which makes using the Qubes Firewall editor in the QUbes manager a no-go without listing all potential ports used by Mullvad
Is there a way when using the âkill switchâ nft rules to allow the VMs behind sys-vpn-mullvad-app to access specific RFC1918 ip address ranges (when VPN is off) so I can do data transfer?
Previously I was using 3 rules via the qubes manager
any to port_number udp # vpn to connect
any to port_number tcp # vpn to connect
rfc1918 to any any # be able to reach my home systems when VPN is disconnected
Create new AppVM using the template created above, with networking = sys-firewall and CHECK âlaunch settings after creationâ and CHECK âProvides network access to other qubesâ in âAdvancedâ
Qube settings (leave everything else as-is);
Check âStart qube automatically on bootâ
Private storage size = 5GB
Advanced: Uncheck âinclude in memory balancingâ (leave initial mem at 400 and 2 CPU)
Services: add ânetwork-managerâ and âqubes-firewallâ
Applications: add âMullvad VPNâ
Start Mullvad appVM, log into Mullvad VPN and configure settings, then configure other appVMs to use the Mullvad AppVM as network