Important Paths

Important Qubes-specific paths.

Path

Location

Description

/rw/config/qubes-bind-dirs.d/*.conf

AppVM

Persist file or directories across reboot.

Example, persist /path/to/file_or_dir:

binds+=('/path/to/file_or_dir')

Files are copied to persistent storage located at /rw/bind-dirs/ and bind mounted.

See also How to make any file persistent (bind-dirs)

/etc/qubes-bind-dirs.d/*.conf

TemplateVM

Persist file or directories across reboot.

See /rw/config/qubes-bind-dirs.d/*.conf

/rw/config/qubes-firewall-user-script
/rw/config/qubes-firewall.d/

AppVM

Custom firewall rules

Script executed during firewall configuration.

Important

This file is only used for a Qube that provides network to others. That is when, qvm-prefs <qube_name> provides_network is true.

On any other Qube, put firewall rules into /rw/config/rc.local

See also Firewall

/rw/config/rc.local

AppVM

Commands to be executed on (late) boot.

/usr/local/lib/systemd/system/

AppVM

Systemd Units

May be used to define or override Systemd services, timer or other units.

To create a service, create /usr/local/lib/systemd/system/<name>.service.

To override a service’s settings, create /usr/local/lib/systemd/system/<name>.service/custom.conf

Note that /usr/local/ is persistent by default.

/var/lib/tor/authdir/*.auth_private

Onion AppVM

Tor .onion authorization files

See Authenticated v3 Onion Services