Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upqubes-firewall may fail to start without downstream DNS #3277
Comments
andrewdavidwong
added
bug
C: core
labels
Nov 3, 2017
andrewdavidwong
added this to the Release 4.0 milestone
Nov 3, 2017
added a commit
to marmarek/qubes-core-agent-linux
that referenced
this issue
Dec 29, 2017
marmarek
referenced this issue
in QubesOS/qubes-core-agent-linux
Dec 29, 2017
Merged
firewall: don't crash the whole qubes-firewall service on DNS fail #82
marmarek
closed this
in
QubesOS/qubes-core-agent-linux#82
Jan 5, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Jan 12, 2018
Automated announcement from builder-github
The package core-agent-linux has been pushed to the r4.0 testing repository for the CentOS centos7 template.
To test this update, please install it with the following command:
sudo yum update --enablerepo=qubes-vm-r4.0-current-testing
qubesos-bot
commented
Jan 12, 2018
|
Automated announcement from builder-github The package
|
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Jan 12, 2018
Automated announcement from builder-github
The package qubes-core-agent_4.0.16-1+deb8u1 has been pushed to the r4.0 testing repository for the Debian jessie template.
To test this update, first enable the testing repository in /etc/apt/sources.list.d/qubes-*.list by uncommenting the line containing jessie-testing, then use the standard update command:
sudo apt-get update && sudo apt-get dist-upgrade
qubesos-bot
commented
Jan 12, 2018
|
Automated announcement from builder-github The package
|
qubesos-bot
added
r4.0-centos7-cur-test
r4.0-jessie-cur-test
labels
Jan 12, 2018
This was referenced Jan 12, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Jan 12, 2018
Automated announcement from builder-github
The package qubes-core-agent_4.0.16-1+deb9u1 has been pushed to the r4.0 testing repository for the Debian stretch template.
To test this update, first enable the testing repository in /etc/apt/sources.list.d/qubes-*.list by uncommenting the line containing stretch-testing, then use the standard update command:
sudo apt-get update && sudo apt-get dist-upgrade
qubesos-bot
commented
Jan 12, 2018
|
Automated announcement from builder-github The package
|
qubesos-bot
added
the
r4.0-stretch-cur-test
label
Jan 12, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Jan 12, 2018
Automated announcement from builder-github
The package python2-dnf-plugins-qubes-hooks-4.0.16-1.fc24 has been pushed to the r4.0 testing repository for the Fedora fc24 template.
To test this update, please install it with the following command:
sudo yum update --enablerepo=qubes-vm-r4.0-current-testing
qubesos-bot
commented
Jan 12, 2018
|
Automated announcement from builder-github The package
|
qubesos-bot
added
the
r4.0-fc24-cur-test
label
Jan 12, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Jan 12, 2018
Automated announcement from builder-github
The package python2-dnf-plugins-qubes-hooks-4.0.16-1.fc25 has been pushed to the r4.0 testing repository for the Fedora fc25 template.
To test this update, please install it with the following command:
sudo yum update --enablerepo=qubes-vm-r4.0-current-testing
qubesos-bot
commented
Jan 12, 2018
|
Automated announcement from builder-github The package
|
qubesos-bot
added
the
r4.0-fc25-cur-test
label
Jan 12, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Jan 12, 2018
Automated announcement from builder-github
The package python2-dnf-plugins-qubes-hooks-4.0.16-1.fc26 has been pushed to the r4.0 testing repository for the Fedora fc26 template.
To test this update, please install it with the following command:
sudo yum update --enablerepo=qubes-vm-r4.0-current-testing
qubesos-bot
commented
Jan 12, 2018
|
Automated announcement from builder-github The package
|
qubesos-bot
added
the
r4.0-fc26-cur-test
label
Jan 12, 2018
qubesos-bot
added
r4.0-jessie-stable
and removed
r4.0-jessie-cur-test
labels
Feb 6, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Feb 6, 2018
Automated announcement from builder-github
The package qubes-core-agent_4.0.20-1+deb9u1 has been pushed to the r4.0 stable repository for the Debian template.
To install this update, please use the standard update command:
sudo apt-get update && sudo apt-get dist-upgrade
qubesos-bot
commented
Feb 6, 2018
|
Automated announcement from builder-github The package
|
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Feb 6, 2018
Automated announcement from builder-github
The component core-agent-linux (including package python2-dnf-plugins-qubes-hooks-4.0.20-1.fc26) has been pushed to the r4.0 stable repository for the Fedora template.
To install this update, please use the standard update command:
sudo yum update
qubesos-bot
commented
Feb 6, 2018
|
Automated announcement from builder-github The component
|
qubesos-bot
added
r4.0-fc26-stable
and removed
r4.0-fc26-cur-test
labels
Feb 6, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Feb 6, 2018
Automated announcement from builder-github
The package core-agent-linux has been pushed to the r4.0 stable repository for the Fedora centos7 template.
To install this update, please use the standard update command:
sudo yum update
qubesos-bot
commented
Feb 6, 2018
|
Automated announcement from builder-github The package
|
3hhh commentedNov 3, 2017
Qubes OS version:
4.0rc2
Affected TemplateVMs:
at least debian-8 was tested, probably any
Steps to reproduce the behavior:
qvm-firewall.Actual behavior:
The qubes-firewall service fails to start. This results in some partial iptables rules on [client] and in combination with #3269 effectively disables the qubes-firewall. [client] will have access to whatever it wants once the connectivity is back up.
Expected behavior:
Some fallback, maybe catch the error situation during setup and block all connections on the qubes-firewall as long as there is no downstream DNS connectivity anyway. Resume the setup afterwards. As an alternative one could simply disallow DNS hostnames.
Related issues:
Fixing #3269 will partially fix this one, but still require the user to manually start the qubes-firewall service which entered a failed state.
General notes:
Qubes supports hostnames on qvm-firewall as iptables supports it.
Combining many minor security flaws tends to lead to bigger ones.