Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign updefault_fw_netvm results in all "provides_network" VMs bypassing firewall by default #3247
Comments
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Oct 28, 2017
Member
I'd recommend completely removing the default_fw_netvm preference and just setting the sys-firewall netvm explicitly to sys-net when sys-firewall is created.
Makes sense
Makes sense |
marmarek
added
bug
C: core
P: major
labels
Oct 28, 2017
marmarek
added this to the Release 4.0 milestone
Oct 28, 2017
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
|
BTW |
added a commit
to marmarek/qubes-core-admin
that referenced
this issue
Dec 1, 2017
added a commit
to marmarek/qubes-core-admin
that referenced
this issue
Dec 5, 2017
added a commit
to marmarek/qubes-core-admin
that referenced
this issue
Dec 6, 2017
marmarek
closed this
in
marmarek/qubes-core-admin@f223594
Dec 10, 2017
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Dec 22, 2017
Automated announcement from builder-github
The package qubes-core-dom0-4.0.15-1.fc25 has been pushed to the r4.0 testing repository for dom0.
To test this update, please install it with the following command:
sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing
qubesos-bot
commented
Dec 22, 2017
|
Automated announcement from builder-github The package
|
qubesos-bot
added
the
r4.0-dom0-cur-test
label
Dec 22, 2017
qubesos-bot
referenced this issue
in QubesOS/updates-status
Dec 22, 2017
Closed
core-admin v4.0.15 (r4.0) #327
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Jan 5, 2018
Automated announcement from builder-github
The package qubes-core-dom0-4.0.15-1.fc25 has been pushed to the r4.0 stable repository for dom0.
To install this update, please use the standard update command:
sudo qubes-dom0-update
Or update dom0 via Qubes Manager.
qubesos-bot
commented
Jan 5, 2018
|
Automated announcement from builder-github The package
Or update dom0 via Qubes Manager. |
qubesuser commentedOct 28, 2017
Qubes OS version:
R4.0-rc2
Steps to reproduce the behavior:
Expected behavior:
The (default) netvm for the VM should be sys-firewall.
Actual behavior:
The (default) netvm for the VM is sys-net.
General notes:
Only sys-firewall should be connected to sys-net (in normal configurations), so it doesn't make sense to attach any VM by default to sys-net. Whether a VM is a proxy VM shouldn't really impact that.
I'd recommend completely removing the default_fw_netvm preference and just setting the sys-firewall netvm explicitly to sys-net when sys-firewall is created.
Workaround
Set sys-firewall netvm to sys-net explicitly and then set default_fw_netvm to sys-firewall