Hi Peter,

that does the trick for me (in /rw/config/rc.local on Qubes 4.1):
iptables -I INPUT 2 -i vif+ -j ACCEPT
ip route add local default dev lo table 100
ip rule add fwmark 1 lookup 100

sshuttle --dns -D --method tproxy --exclude REMOTE_SERVER --exclude 10.0.0.0/8 --disable-ipv6 --listen 0.0.0.0:0 -r REMOTE_SERVER 0/0


All the best


On 3/30/24 12:52, Peter Palensky wrote:
I need a sys-sshuttle qube to encapsulate traffic via sshuttle. Locally (from sys-sshuttle) it works, but connected qubes get the previously mentioned "no connection to host" message.

Played around with various nft ideas, but no success.

tcpdump on the vif shows requests (e.g. DNS, http, etc.) but they are not answered.

How do i redirect incoming traffic from vif to the sshuttle process listening on port 12300 as it is happening with local traffic?
On Wednesday, February 18, 2015 at 9:05:10 PM UTC+1 HW42 wrote:

    D. J. Bernstein:
     > Has anyone tried setting up sshuttle under Qubes?

    Haven't used it before but I did a quick test.

     > After setting up root@netvm to be able to ssh to another machine
    ("ssh
     > speed"), I ran
     >
     > sshuttle -v -r speed 0/0 -x 10/8
     >
     > and expected that outgoing TCP connections would be transparently
     > proxied via the ssh connection. The sshuttle program reported
    that it
     > was doing
     >
     > iptables -t nat -N sshuttle-12300
     > iptables -t nat -F sshuttle-12300
     > iptables -t nat -I OUTPUT 1 -j sshuttle-12300
     > iptables -t nat -I PREROUTING 1 -j sshuttle-12300
     > iptables -t nat -A sshuttle-12300 -j RETURN --dest 127.0.0.0/8
    <http://127.0.0.0/8> -p tcp
     > iptables -t nat -A sshuttle-12300 -j RETURN --dest 10.0.0.0/8
    <http://10.0.0.0/8> -p tcp
     > iptables -t nat -A sshuttle-12300 -j REDIRECT --dest 0.0.0.0/0
    <http://0.0.0.0/0> -p tcp --to-ports 12300 -m ttl ! --ttl 42
     >
     > as I expected, and outgoing TCP connections _from netvm_ were
    proxied as
     > I expected, but outgoing TCP connections from other VMs failed
    with "no
     > route to host".
     >
     > I haven't explored how the Qubes intra-host networking setup works,
     > haven't started debugging with tcpdump, etc.; I'm just hoping that
     > someone else has already looked at this.

    sshuttle needs to accept connection from external ips (only
    localhost by
    default) and listen on fixed port:
    sshuttle -v -l 0.0.0.0:123000 -r speed 0/0 -x 10/8

    Allow the redirected packets:
    iptables -I INPUT 1 -i vif+ -p tcp --dport 12300 -j ACCEPT

    WARNING: This makes FORWARD firewall rules ineffective.


    HW42


--
You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com <mailto:qubes-users+unsubscr...@googlegroups.com>. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/6cc6eba0-a1ac-48de-9146-1b3e3db8948dn%40googlegroups.com <https://groups.google.com/d/msgid/qubes-users/6cc6eba0-a1ac-48de-9146-1b3e3db8948dn%40googlegroups.com?utm_medium=email&utm_source=footer>.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/2f43b952-f4ff-4973-84bb-baa981913b32%40posteo.net.

Reply via email to