Feb 14, 2019, 3:42 PM by un...@thirdeyesecurity.org:

> On Thu, Feb 14, 2019 at 03:13:00PM +0100, > ashleybrown...@tutanota.com 
> <mailto:ashleybrown...@tutanota.com>>  wrote:
>
>>
>>
>> Hopefully one day they revert it back to how it was in 3.2. A very common 
>> use-case for the firewall is likely to ensure things like DNS requests do 
>> not happen through the normal means (and instead go over something like Tor 
>> or a VPN). Unfortunately, the current config does not make it very obvious 
>> that someone should block DNS ports. Making it very easy for someone to 
>> shoot themselves in the foot because the interface is not intuitive (it says 
>> it blocks all traffic other than what is specified and then later modifies 
>> this saying "just kidding, we let DNS through")
>>
>> Feb 14, 2019, 2:05 PM by >> ashleybrown...@tutanota.com 
>> <mailto:ashleybrown...@tutanota.com>>> :
>>
>> > > The magic is in NAT rules (but I had to research this too.) See > >> 
>> > > https://www.qubes-os.org/doc/networking 
>> > > <https://www.qubes-os.org/doc/networking>>>  <>> 
>> > > https://www.qubes-os.org/doc/networking 
>> > > <https://www.qubes-os.org/doc/networking/>>> >> , and "sudo iptables -t 
>> > > nat -L" in sys-firewall and sys-net.
>> >
>> > I previously looked at IP tables and honestly I really do not understand 
>> > it. Can you please explain a little how it works?
>> >
>> > Here is what my nat look like in sys-firewall:
>> >
>> > Chain PR-QBS (1 references)
>> > target     prot opt source               destination        
>> > DNAT       udp  --  anywhere             10.139.1.1           udp 
>> > dpt:domain to:10.139.1.1
>> > DNAT       tcp  --  anywhere             10.139.1.1           tcp 
>> > dpt:domain to:10.139.1.1
>> > DNAT       udp  --  anywhere             10.139.1.2           udp 
>> > dpt:domain to:10.139.1.2
>> > DNAT       tcp  --  anywhere             10.139.1.2           tcp 
>> > dpt:domain to:10.139.1.2
>> >
>> > So, when I do ping google.com it needs to do a DNS request. Because my 
>> > AppVm /etc/resolv.conf is set to 10.139.1.1 it creates a DNS request to 
>> > send to 10.139.1.1. However, no VM on the network actually has this 
>> > address.
>> >
>> > Is that packet modified? I am assuming what happens is the packet is 
>> > forwarded to whoever the internet provider is (in this case sys-firewall). 
>> > Sys-firewall then forwards it to sys-net. Sys-net then forwards it to the 
>> > DNS server.
>> >
>> > I am assuming the IP-Header of each hop is rewritten. So, for example, 
>> > sys-net will rewrite the IP header to be the external IP address for the 
>> > computer and thus it will receive a response to that IP. Assuming this is 
>> > correct how does the original AppVM get the correct response? I assume 
>> > multiple AppVMs are all forwarding these UDP dns requests through 
>> > sys-firewall and then sys-net. And then when sys-net gets a response how 
>> > does it know to send which response to which specific AppVM?
>> >
>> > -- 
>> > Securely sent with Tutanota. Get your own encrypted, ad-free mailbox: 
>> > >> https://tutanota.com <https://tutanota.com>>>  <>> https://tutanota.com 
>> > >> <https://tutanota.com>>> >
>> >
>> >
>> > Feb 14, 2019, 11:46 AM by > >> qubes-users@googlegroups.com 
>> > <mailto:qubes-users@googlegroups.com>>>  <mailto:>> 
>> > qubes-users@googlegroups.com <mailto:qubes-users@googlegroups.com>>> >> :
>> >
>> >> >> ashleybrown...@tutanota.com <mailto:ashleybrown...@tutanota.com>>>  
>> >> >> <mailto:>> ashleybrown...@tutanota.com 
>> >> >> <mailto:ashleybrown...@tutanota.com>>> >>>  wrote on 2/14/19 6:28 AM:
>> >>
>> >>> When I look at /etc/resolv.conf in the following VMs it says different 
>> >>> things:
>> >>>
>> >>> 1) Normal AppVM:
>> >>>
>> >>> nameserver 10.139.1.1
>> >>> nameserver 10.139.1.2
>> >>>
>> >>> 2) Sys-firewall VM:
>> >>>
>> >>> nameserver 10.139.1.1
>> >>> nameserver 10.139.1.2
>> >>>
>> >>> 3) Sys-net VM:
>> >>>
>> >>> [actual resolvers]
>> >>>
>> >>> The chain for DNS packets is obviously AppVM -> Sys-firewall -> sys-net
>> >>>
>> >>> However, what I don't undersatnd is that 10.139.1.1 does not exist. That 
>> >>> is not the IP address for any VM on the network. This can  be verified 
>> >>> in Qubes Manager looking at the IP column. In addition, 10.139.1.1 
>> >>> refers to different VMs depending on the VM sending the packets. In 
>> >>> AppVM it routes to sys-firewall. In sys-firewall it routes to sys-net.
>> >>>
>> >>> So, my question is how does all of this work? Where exactly does any 
>> >>> request to 10.139.1.1 route to the actual connected VM. Looking at IP 
>> >>> table rules I do not see where traffic sent to 10.139.1.1 goes to 
>> >>> [sys-firewall IP here] for example. It appears to be doing it all 
>> >>> magically, so where is the magic?
>> >>>
>> >>
>> >> The magic is in NAT rules (but I had to research this too.) See >> >> 
>> >> https://www.qubes-os.org/doc/networking 
>> >> <https://www.qubes-os.org/doc/networking>>>  <>> 
>> >> https://www.qubes-os.org/doc/networking 
>> >> <https://www.qubes-os.org/doc/networking/>>> >>> , and "sudo iptables -t 
>> >> nat -L" in sys-firewall and sys-net.
>> >>
>>
>
> Please don't top post. Take a minute to make it easier for other users.
> As is clear in another thread, there is a clear warning about DNS on the
> GUI firewall - I find it hard to believe that anyone could miss this.
>
I am new to mailing lists. What does top-post mean? Do you mean don't post the 
reply at the top of the message and instead at the bottom like this?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/LYjzz2s--3-1%40tutanota.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to