On Thursday, March 8, 2018 at 2:04:26 PM UTC+1, brandonm...@gmail.com wrote:
> Hi all, 
> 
> Thanks so much for your responses.
> 
> So a bit more background as requested I run Qubes 3.2 basically Vagrant 
> allows me to create hyper-vised environments for WordPress to run locally 
> pulling from https//:github.com/Varying-Vagrant-Vagrants/ this creates the 
> server environments etc.
> 
> I then run Variable VV which automates WordPress site creation this can be 
> found here:
> 
> https://github.com/bradp/vv
> 
> I have never been able to get this to work on qubes essentially I want to 
> create a VM where I can hold all my sites locally. Automate WordPress 
> creation and then deploy to a staging or live site.

This should be all down to the Qubes firewall rules. The default firewall is 
essentially acting like a router hardware firewall, blocking all incoming 
signals, unless you yourself initiated it (similar to the general Linux 
firewall as well). So what you need to do is to pass the rules to allow your 
server to get through. But here on forward, nothing is official, you need to be 
careful and thnik carefully in order not to open up new security holes. Ask 
more people who have better insight in Qubes security for second opinions, etc. 

You could quicly test it by making a clone of your server, and try tie it 
directly to your sys-net instead of sys-firewall. This is however very dodgy 
and never do it on something important or something you plan to keep 
afterwards, since it essentially has no firewall in that period of time.

But try make a clone of your Qubes server, and tie the clone to your sys-net, 
are you able to see the server now? Don't let it run too long either, just in 
case it can be used to attack other parts of Qubes (here is where you 
especially need a second opinion of a more knowledgeable person in Qubes 
security). 

If it works, then you now saw first hand that it's sys-firewall blocking you. I 
once did something similar for some Syncthing connections when I first started 
learning Qubes, this made me succesfully open up Syncthing networking without 
changing the sys-firewall rules. Delete your testing clone once you confirmed 
it works. 

Now you need to find out how to do this in a secure way, so that you don't open 
a can of worms down the road. I haven't seen this discussed before, but my 
thoughts are a second firewall here. Otherwise it might just be down to editing 
the existing sys-firewall. For that, you're in luck, there are a very detailed 
guide available for it; https://www.qubes-os.org/doc/firewall/ which also 
covers inter-VM connections, as well as server connections (who different 
things of course).

To me an ideal solution would be a second firewall in Qubes, similar to how DMZ 
isolation zones are made in highly secure networks. So in a way, you'd be 
DMZ'ing Qubes, which I think, would make perfect sense for something you want 
to do here. If you got a server, then that server should be kept under a 
different firewall altogether, albeit still on the same machine/Qubes.

While DMZ'ing Qubes seems to make good sense first, remember, I have never had 
this confirmed anywhere. It's critical you have a second opinion by someone 
skilled in Qubes security before you consider to take my advice here head on.

In practice though, I believe it should work pretty well. It's mostly the 
security thing I'm wondering about. It's been a while I read that long guide in 
the lnik though, maybe they made edits in it to include some of these thoughts? 
I'd have to read it again my self at some point. Maybe you'll find info in 
there to help answer some of these questions.

Also try check this out; https://github.com/Rudd-O/qubes-network-server
You might not need to use any of these installs/tools to cover your needs, but 
it might be a helpful read still to see alternative solutions. 

Remember that second opinion of a skilled security person. That above guide is 
by no means Qubes official either, even though it looks quite interesting I 
gotta admit.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fc3f2f12-6e68-4937-8c98-4af16483eb20%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to