I have a VPN qube set up with all the proper firewall rules and such.
Now, since I am a new Qubes user, my greatest concern is that traffic will still leak through at some point in my system, for example through Dom0 updates (fixed that already)
What generally has to be done so that nothing leaks through?
Traffic from netvm before the VPN (= closer to sys-net in the chain) won’t be covered by the VPN, and they do some network operations for themselves like checking for updates for the linux distribution it’s running + checking updates on Qubes OS repository.
In addition, you need to configure updates to be done through the vpn qube, otherwise it’s using sys-firewall or sys-net.
If you want to be 100% sure that no traffic bypasses the VPN… run the VPN tunnel upstream, outside Qubes. Maybe use a Raspberry Pi and run PiHole there too, for good measure. Then you use the Pi as a router and protect your whole network.
Just saying.
“pluggable transport” are protocols to get into Tor when you are blocked. It is not recommended to use pluggable transports when you do not need to.
Tor pluggable transports are used for circumventing censorship to access the Tor network, so they are not relevant regarding network traffic leaks in this topic.