-
-
Notifications
You must be signed in to change notification settings - Fork 53
Open
Labels
C: otherNo other component ("C:") label applies to this issue, or the appropriate label is not yet known.No other component ("C:") label applies to this issue, or the appropriate label is not yet known.P: defaultPriority: default. Default priority for new issues, to be replaced given sufficient information.Priority: default. Default priority for new issues, to be replaced given sufficient information.
Description
In normal Qubes OS, AppVM DNS requests get forwarded through the ProxyVM and then to the NetVM, which in turn sends them.
The problem is that the resolver library in the AppVM will not obey the DNS search domains setting in the NetVM's resolv.conf (usually obtained via DHCP). So, if your business has a default domain search setting such as example.com and you ping aardvark from the NetVM, it will work correctly to resolve aardvark.example.com, but if you do that from the AppVM, bam, NXDOMAIN.
I see two solutions:
- A daemon like
systemd-resolvedordnsmasqin the NetVM, which automatically and recursively resolves DNS requests coming from chained VMs by obeyingresolv.conf's settings. - A qrexec-based mechanism to set up
resolv.confin the chained VMs on boot of the VM, and to update it when the NetVM'sresolv.confchanges.
What say you?
Metadata
Metadata
Assignees
Labels
C: otherNo other component ("C:") label applies to this issue, or the appropriate label is not yet known.No other component ("C:") label applies to this issue, or the appropriate label is not yet known.P: defaultPriority: default. Default priority for new issues, to be replaced given sufficient information.Priority: default. Default priority for new issues, to be replaced given sufficient information.