-
-
Notifications
You must be signed in to change notification settings - Fork 50
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Qubes-firewall applies incorrect DNS rules when using VPN and limiting AppVM connections #7882
Comments
If my understanding is correct, the This seems as the correct way forward according to the commit message that created
|
I'm having a similar issue with DNS in 4.1.1 - My issue only applies starting with a vpn AppVM that has a template of fedora 34 or fedora 35 (tested to not work). For some reason when I set the fedora template to fedora-32 or fedora-33 for the vpn AppVM, dns resolves properly and openvpn works fine. Changing the template for sys-net and sys-firewall doesn't break the dns. |
That architecture is pretty bad practice as Qubes will always use the next downstream VM to enforce your firewall rules, i.e. in your case the |
@3hhh please explain why is that a bad practice? What VPN client rules are you referring to? |
This issue is being closed because:
If anyone believes that this issue should be reopened, please leave a comment saying so. |
Qubes OS release
4.1
Brief summary
I searched the issues and I believe this one to be distinct than other possibly related (ie. #1183, #5706, #6927).
With the following setup:
AppVM --> VPN VM --> Firewall VM --> NetVM
and with the "AppVM" firewall set to limit outgoing connections to set of hosts(via GUI), the firewall in VPN VM applies DNS rules with
incorrect DNS servers set, thus cutting off the actual networking in AppVM.
For the AppVM with ip (10.137.0.27), that should be able to connect only to "X.X.X.X", the rules looks like:
sudo nft list table qubes-firewall
and the
sudo iptables -t nat -nvL
shows:It is my understanding that the script
/etc/dhclient.d/qubes-setup-dnat-to-ns.sh
works correctly, but thequbes-firewall
uses the incorrect values to setupnft
rules, not respecting that thesystemd-resolved
is activeusing the value from
/etc/resolv.conf
instead.This used to work fine in 4.0 as far as I can tell, as the VMs in question were migrated directly from a working installation of 4.0.
The problem affects migrated as well as newly created AppVMs.
Steps to reproduce
Expected behavior
AppVM connects succesfully to the allowed host.
Actual behavior
It is not possible to resolve the domain name.
The text was updated successfully, but these errors were encountered: