-
Notifications
You must be signed in to change notification settings - Fork 28
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
4.1 and Liteqube #174
Comments
I see this too, but it will work as expected (to validate, you can try to restrict to one domain and you won't be able to get traffic outside that domain). The message may come from a missing signaling part in the communication protocol between Qubes and the unikernel. We can probably leave this issue open until this message is fixed. |
Update: I probably checked the issue on an old mirage-firewall installation, but with the new installation procedure, we should run Can you tell me if this solves the problem for you? |
I did this at install, as per the README file instructions. No joy. I've setup the same configuration on a vanilla 4.1 with firewall rules in the mirage VM, and it acts as a perfect vpn killswitch, allowing only VPN traffic. but here it allows both clearnet and VPN traffic, even with the rules. |
Would you mind to give the result of |
|
Thank you for that output. These rules (set on mirage-fw in Qubes Manager but not dealt inside mirage-fw, it's up to it's netvm to filter the netflow) should be visible in the netvm with It may also worth to try to set the rules on your vpn VM tab in Qubes Manager to check how mirage-fw deals with that. |
They don't seem to populate in core-net, but of course the rules work when set through the Qubes Manager in sys-vpn, though I'm stumped as to why I can't set all necessary rules in fw-mirage. |
Yes I think you should be able to restrict the vpn netflow by setting rules on the mirage-fw tab in Qubes Manager. However this leads into rules being checked by sys-net or core-net which is untrusted, and that sounds odd to me. Given it seems to work as intended with a vanilla Qubes, is it possible to try with liteqube and a normal linux firewall: setting rules on that VM and see if it works as vpn killswitch? If it works we should fix something into mirage-fw, and if not it's probably something relevant in liteqube (and we may open an issue there with this one as background). |
I created a new default sys-firewall When I set the rules in sys-vpn, the appqube, and mirage-fw, those rules don't appear to be visible in core-net. |
As it works fine with a linux firewall, I assume the issue comes from mirage-fw, but I don't see what it could be so far :( |
To summarize the tests, am I right with the following?
So the situation is that we can't filter traffic outside vpn with mirage-fw directly after core-net, but we can't reproduce it with standard Qubes distribution. |
Correct. Happy to test any other configurations. Is the red text appearing only since the latest Qubes release?
|
Hi, I found an easy way to check firewall rules in core-net, would you mind to type:
You should get something referring |
Sorry I forgot the command to type in core-net : |
Hmmmm, that's bizarre: core-net and debian-core are both mssing nftables and thus I can't run nft. |
Oh that's probably because liteqube uses the I'm also thinking about the vpn script (https://github.com/a-barinov/liteqube/blob/main/4.VPN/default/debian-core/etc/protect/template.core-vpn/usrlocal/bin/liteqube-vpn), please, if that's what you use as vpn, can you check that the iptables rules are correctly up ? (this should be visible in the core-vpn VM with |
I don't use the liteqube VPN, but rather a variant of this: https://forum.qubes-os.org/t/how-to-setup-openvpn-fedora-appvm-for-ovpn/3354 |
Ok thanks ! Anyway this is probably not the root cause. It seems that iptables in debian stands for nft, so you still should be able to see the rules for mirage-fw inside core-net (but the syntax could be different and I havn't liteqube for testing :( ), would you mind to share that? |
|
So I have exactly the same (classical Qubes, fedora sys-net). So there's probably a way to check into core-net the filter rules you set for mirage-fw. Sadly I didn't find something useful yet :( |
@arkenoi, @froeb I recently saw that you've been trying to adapt liteqube to Qubes 4.2. I'm throwing a bottle into the sea in case you might have an idea of what could cause issues with mirage-fw (not) acting as a killswitch when used in a VPN context. |
@arkenoi you seem to have fully updated to Qubes 4.2 recently, do you know if this issue is still present in latest Qubes release? |
I did not try yet, but I will. |
I manually unpacked and installed the mirage fw and kernel into a liteqube setup on 4.1 (I realize liteqube also offers it as its own fw). The VM seems to function, but it cannot supply firewall rules. There is a red banner notice reading "Net qube does not support 'qubes-firewall'. Firewall restrictions will not be applied."
The text was updated successfully, but these errors were encountered: