-
-
Notifications
You must be signed in to change notification settings - Fork 50
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Firewall rule 'Allow DNS queries' does not take into account custom (VPN) DNS server #1183
Comments
Still valid in 3.2. (all in VPN VM:) Example: (10.137.2.1 = firewallVM used by the VPN VM as netvm) iptables -t nat -L Chain INPUT (policy ACCEPT) Chain OUTPUT (policy ACCEPT) Chain POSTROUTING (policy ACCEPT) Chain PR-QBS (1 references) Chain PR-QBS-SERVICES (1 references) All of that after setting resolv.conf to [VPN-SERVER-DNS-IP] and a manual call to /usr/lib/qubes/qubes-setup-dnat-to-ns . route -n |
workaround: |
This is already handled in Qubes 4.0 (as part of #1815 ). But it isn't feasible for backport to R3.2 unfortunately. |
Comprehensive regex to fix the FORWARD chain, per @3hhh suggestion:
This could be added to both qubes-firewall-user-script and qubes-vpn-handler. |
Should also investigate possibility of re-populating /var/run/qubes/qubes-ns with new DNS addresses. |
Committed a fix for this in my VPN project. This can be added to the VPN doc as well. |
I'm thinking this could be fixed in R3.2.x and maybe the best overall way is to use an additional file like /var/run/qubes/qubes-tun-ns to hold the tunnel's DNS addresses. This can be used by the firewall if it exists. Another way is to put the |
The sed solution was a mere hack and should never make it into any proper OS design. Moreover it only works if you switch the "Allow DNS queries" checkbox even if you allow all network traffic (which is different from the standard Qubes OS behavior). |
Correct, it only works under that condition but that's because the purpose is to prevent unnecessary blocking of DNS. Using OTOH, the other solution just imitates what is done with /var/run/qubes/qubes-ns, seems simpler. |
This is somewhat fixed in 4.0rc1 as the dynamic iptables rules in proxyVMs were removed entirely, i.e. custom DNS servers should work. Only drawback: Local DNS servers are affected by #3051 |
This is not true. There are moved into nftables. And they do support custom dns (based on what you have in /etc/resolv.conf). See |
This issue is being closed because:
If anyone believes that this issue should be reopened and reassigned to an active milestone, please leave a brief comment. |
https://groups.google.com/d/msg/qubes-users/EPe4U0kF67A/CJfHD245KwAJ
Reported by theman, cprise.
The text was updated successfully, but these errors were encountered: