New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

VPN script problem on Fedora: cannot resolve domain names #3348

Closed
boistordu opened this Issue Nov 29, 2017 · 35 comments

Comments

Projects
None yet
3 participants
@boistordu

Qubes OS version:

R3.2

Affected TemplateVMs:

fedora26-minimal

vpn as proxyvm
sudo sg qvpn -c 'ping 8.8.8.8' give me an operation not permitted

and in appvm connected to the proxvm can't resolve domain name but can ping ip adress as 8.8.8.8

@andrewdavidwong

This comment has been minimized.

Show comment
Hide comment
@andrewdavidwong

andrewdavidwong Nov 30, 2017

Member

Based on our issue reporting guidelines, this does not appear to be suitable for qubes-issues. We ask that you please send this to the qubes-users mailing list instead. If, after reading our issue reporting guidelines, you believe we are mistaken, please leave a brief comment explaining why. We'll be happy to take another look, and, if appropriate, reopen this issue. Thank you for your understanding.

Member

andrewdavidwong commented Nov 30, 2017

Based on our issue reporting guidelines, this does not appear to be suitable for qubes-issues. We ask that you please send this to the qubes-users mailing list instead. If, after reading our issue reporting guidelines, you believe we are mistaken, please leave a brief comment explaining why. We'll be happy to take another look, and, if appropriate, reopen this issue. Thank you for your understanding.

@boistordu

This comment has been minimized.

Show comment
Hide comment
@boistordu

boistordu Nov 30, 2017

I think it's indeed a problem with qubes and it's correlated to qubes guidelines.
I've followed : wiki and all the scripts in it. So it should workd as intended in the wiki pages.
Problem, it is not... The proxyvm is working as intended if I'm using the network manager.... So there is clearly a problem with one of the script and the new fedora.

I think it's indeed a problem with qubes and it's correlated to qubes guidelines.
I've followed : wiki and all the scripts in it. So it should workd as intended in the wiki pages.
Problem, it is not... The proxyvm is working as intended if I'm using the network manager.... So there is clearly a problem with one of the script and the new fedora.

@andrewdavidwong andrewdavidwong added bug C: other and removed invalid labels Dec 1, 2017

@andrewdavidwong andrewdavidwong added this to the Release 3.2 updates milestone Dec 1, 2017

@andrewdavidwong andrewdavidwong changed the title from problem vpn VM to VPN script problem on Fedora: cannot resolve domain names Dec 1, 2017

@andrewdavidwong

This comment has been minimized.

Show comment
Hide comment
@andrewdavidwong

andrewdavidwong Dec 1, 2017

Member

Reopened and updated title to be more descriptive.

Member

andrewdavidwong commented Dec 1, 2017

Reopened and updated title to be more descriptive.

@boistordu

This comment has been minimized.

Show comment
Hide comment
@boistordu

boistordu Dec 2, 2017

no idea about what could be wrong with the script about the dns ? How should I debug this anyway? Don't know which log even to look for

no idea about what could be wrong with the script about the dns ? How should I debug this anyway? Don't know which log even to look for

@andrewdavidwong

This comment has been minimized.

Show comment
Hide comment
@andrewdavidwong

andrewdavidwong Dec 3, 2017

Member

@tasket might be the best person to ask about this.

Member

andrewdavidwong commented Dec 3, 2017

@tasket might be the best person to ask about this.

@tasket

This comment has been minimized.

Show comment
Hide comment
@tasket

tasket Dec 3, 2017

@boistordu ping no longer works well under the user/group restriction, so its better to focus on the client software itself (i.e. openvpn) for diagnostics.

For logs, you can check journalctl for openvpn entries, or test openvpn directly as suggested in the vpn doc. One place where dns can fail is PR-QBS chain in iptables, so checking that for the correct addresses is a good idea.

I don't have an R3.2 system right now, but I can try out the fedora-26 template on R4-rc3 tonight to see if a dns problem occurs there.

tasket commented Dec 3, 2017

@boistordu ping no longer works well under the user/group restriction, so its better to focus on the client software itself (i.e. openvpn) for diagnostics.

For logs, you can check journalctl for openvpn entries, or test openvpn directly as suggested in the vpn doc. One place where dns can fail is PR-QBS chain in iptables, so checking that for the correct addresses is a good idea.

I don't have an R3.2 system right now, but I can try out the fedora-26 template on R4-rc3 tonight to see if a dns problem occurs there.

@tasket

This comment has been minimized.

Show comment
Hide comment
@tasket

tasket Dec 3, 2017

@marmarek It appears that in fedora-26-minimal parts of netfilter and qubes guest are missing or not configured and I'm not sure which packages are needed to bring the template up to spec; I looked in docs but didn't see a guide.

tasket commented Dec 3, 2017

@marmarek It appears that in fedora-26-minimal parts of netfilter and qubes guest are missing or not configured and I'm not sure which packages are needed to bring the template up to spec; I looked in docs but didn't see a guide.

@boistordu

This comment has been minimized.

Show comment
Hide comment
@boistordu

boistordu Dec 3, 2017

the openvpn was working before the implementation of the differents scripts that's for sure. Better proof is that with the same openvpn script I was connecting through network manager before on a different proxyvm.And anyway it's a big vpn company so it's a script that I would have done or something like that.
if ping doesn't work anymore it coud be a good idea to change the wiki page then to say that even with sg it doesn't work.
so what could be faulty here is maybe the lines added in openvpn script from the wiki page or the iptables script.
with journalctl I don't see any error besides the pulseaudio error. Should I have any error? Since it is a DNS problem, I would more likely look at the transfer of env variables from script to script than anything else.

the openvpn was working before the implementation of the differents scripts that's for sure. Better proof is that with the same openvpn script I was connecting through network manager before on a different proxyvm.And anyway it's a big vpn company so it's a script that I would have done or something like that.
if ping doesn't work anymore it coud be a good idea to change the wiki page then to say that even with sg it doesn't work.
so what could be faulty here is maybe the lines added in openvpn script from the wiki page or the iptables script.
with journalctl I don't see any error besides the pulseaudio error. Should I have any error? Since it is a DNS problem, I would more likely look at the transfer of env variables from script to script than anything else.

@boistordu

This comment has been minimized.

Show comment
Hide comment
@boistordu

boistordu Dec 3, 2017

about the PR-QBS chain I don't see anything related to those lines in the script:

    for addr in $vpn_dns; do
        iptables -t nat -A PR-QBS -i vif+ -p udp --dport 53 -j DNAT --to $addr
        iptables -t nat -A PR-QBS -i vif+ -p tcp --dport 53 -j DNAT --to $addr

So it's more likely that the $vpn_dns env var didn't go through.
there is only 4 lines in it in place of 6 with 2 that would be tcp dpt:53 related

about the PR-QBS chain I don't see anything related to those lines in the script:

    for addr in $vpn_dns; do
        iptables -t nat -A PR-QBS -i vif+ -p udp --dport 53 -j DNAT --to $addr
        iptables -t nat -A PR-QBS -i vif+ -p tcp --dport 53 -j DNAT --to $addr

So it's more likely that the $vpn_dns env var didn't go through.
there is only 4 lines in it in place of 6 with 2 that would be tcp dpt:53 related

@boistordu

This comment has been minimized.

Show comment
Hide comment
@boistordu

boistordu Dec 3, 2017

but maybe it is my fault, because of this problem my understanding of the :

# To override DHCP DNS, assign DNS addresses to 'vpn_dns' env variable before calling this script;
# Format is 'X.X.X.X  Y.Y.Y.Y [...]'

is different now. Do I need to put myself the dns addresses ? Because with network manager I didn't had to do that.... So I was thinking that it was automatically added because of the ovpn script?

but maybe it is my fault, because of this problem my understanding of the :

# To override DHCP DNS, assign DNS addresses to 'vpn_dns' env variable before calling this script;
# Format is 'X.X.X.X  Y.Y.Y.Y [...]'

is different now. Do I need to put myself the dns addresses ? Because with network manager I didn't had to do that.... So I was thinking that it was automatically added because of the ovpn script?

@tasket

This comment has been minimized.

Show comment
Hide comment
@tasket

tasket Dec 3, 2017

Override is not necessary if DHCP is working; normally DNS assignment is automatic.

The log should have a line like:

openvpn[1234]: Using DNS servers x.x.x.x y.y.y.y

with x and y being actual numbers. It should also have a line that says Initialization sequence completed.


However, I'll reiterate that I can't get fedora-26-minimal working properly... it does not seem ready for general use. At this point I'd suggest using a Debian 8 or 9 template instead.

tasket commented Dec 3, 2017

Override is not necessary if DHCP is working; normally DNS assignment is automatic.

The log should have a line like:

openvpn[1234]: Using DNS servers x.x.x.x y.y.y.y

with x and y being actual numbers. It should also have a line that says Initialization sequence completed.


However, I'll reiterate that I can't get fedora-26-minimal working properly... it does not seem ready for general use. At this point I'd suggest using a Debian 8 or 9 template instead.

@boistordu

This comment has been minimized.

Show comment
Hide comment
@boistordu

boistordu Dec 3, 2017

the log has nothing related to : sudo journalctl | grep "DNS servers"
but it does say "Initialization Sequence complete"

so can I use the same appvm but just change the template origin?

boistordu commented Dec 3, 2017

the log has nothing related to : sudo journalctl | grep "DNS servers"
but it does say "Initialization Sequence complete"

so can I use the same appvm but just change the template origin?

@boistordu

This comment has been minimized.

Show comment
Hide comment
@boistordu

boistordu Dec 3, 2017

same result with the debian 9 template. the vpn link is up but the dns requested are still no-go

same result with the debian 9 template. the vpn link is up but the dns requested are still no-go

@boistordu

This comment has been minimized.

Show comment
Hide comment
@boistordu

boistordu Dec 3, 2017

So can we just simply see together the different script ? and how does it work script by script?

So can we just simply see together the different script ? and how does it work script by script?

@boistordu

This comment has been minimized.

Show comment
Hide comment
@boistordu

boistordu Dec 3, 2017

Dec 03 23:07:42 VPN systemd[1]: Started OpenVPN service.
Dec 03 23:07:42 VPN systemd-resolved[670]: Positive Trust Anchors:
Dec 03 23:07:42 VPN systemd-resolved[670]: . IN DS 19036 8 2 somenumbers
Dec 03 23:07:42 VPN systemd-resolved[670]: . IN DS 20326 8 2 somenumbers
Dec 03 23:07:42 VPN systemd-resolved[670]: Negative trust anchors: 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-
Dec 03 23:07:42 VPN systemd-resolved[670]: Using system hostname 'VPN'.
Dec 03 23:07:42 VPN systemd-resolved[670]: Switching to system DNS server 10.137.2.1.
Dec 03 23:07:42 VPN dbus[529]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher'
Dec 03 23:07:42 VPN systemd[1]: Started Network Manager Script Dispatcher Service.
Dec 03 23:07:42 VPN NetworkManager[575]: <info>  [1512338862.5942] settings: loaded plugin keyfile: (c) 2007 - 20
Dec 03 23:07:42 VPN su[674]: Successful su for user by root

boistordu commented Dec 3, 2017

Dec 03 23:07:42 VPN systemd[1]: Started OpenVPN service.
Dec 03 23:07:42 VPN systemd-resolved[670]: Positive Trust Anchors:
Dec 03 23:07:42 VPN systemd-resolved[670]: . IN DS 19036 8 2 somenumbers
Dec 03 23:07:42 VPN systemd-resolved[670]: . IN DS 20326 8 2 somenumbers
Dec 03 23:07:42 VPN systemd-resolved[670]: Negative trust anchors: 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-
Dec 03 23:07:42 VPN systemd-resolved[670]: Using system hostname 'VPN'.
Dec 03 23:07:42 VPN systemd-resolved[670]: Switching to system DNS server 10.137.2.1.
Dec 03 23:07:42 VPN dbus[529]: [system] Successfully activated service 'org.freedesktop.nm_dispatcher'
Dec 03 23:07:42 VPN systemd[1]: Started Network Manager Script Dispatcher Service.
Dec 03 23:07:42 VPN NetworkManager[575]: <info>  [1512338862.5942] settings: loaded plugin keyfile: (c) 2007 - 20
Dec 03 23:07:42 VPN su[674]: Successful su for user by root
@boistordu

This comment has been minimized.

Show comment
Hide comment
@boistordu

boistordu Dec 3, 2017

still the same 4 lines in the iptables.
no dns transaction at all in the journalctl.

maybe from the start it does not transfer any DNS.... Because when I was using the openvpn script in network manager, maybe it was the dns from my local network and not from the vpn provider

still the same 4 lines in the iptables.
no dns transaction at all in the journalctl.

maybe from the start it does not transfer any DNS.... Because when I was using the openvpn script in network manager, maybe it was the dns from my local network and not from the vpn provider

@boistordu

This comment has been minimized.

Show comment
Hide comment
@boistordu

boistordu Dec 3, 2017

I just seen on the forum from the vpn provider, they send dns with the connection.
They had in the script to prevent the leak:

script-security 2
up /etc/openvpn/update-resolv-conf
down /etc/openvpn/update-resolv-conf

so is it interfering with this part?

script-security 2
up '/rw/config/vpn/qubes-vpn-handler.sh up'
down '/rw/config/vpn/qubes-vpn-handler.sh down'

I just seen on the forum from the vpn provider, they send dns with the connection.
They had in the script to prevent the leak:

script-security 2
up /etc/openvpn/update-resolv-conf
down /etc/openvpn/update-resolv-conf

so is it interfering with this part?

script-security 2
up '/rw/config/vpn/qubes-vpn-handler.sh up'
down '/rw/config/vpn/qubes-vpn-handler.sh down'

@tasket

This comment has been minimized.

Show comment
Hide comment
@tasket

tasket Dec 3, 2017

That would definitely interfere. You would need to replace the original script lines.

tasket commented Dec 3, 2017

That would definitely interfere. You would need to replace the original script lines.

@boistordu

This comment has been minimized.

Show comment
Hide comment
@boistordu

boistordu Dec 3, 2017

aaah so maybe that's the problem then.
So how can I combine both of them? Or should I trust to remove it?

aaah so maybe that's the problem then.
So how can I combine both of them? Or should I trust to remove it?

@tasket

This comment has been minimized.

Show comment
Hide comment
@tasket

tasket Dec 4, 2017

qubes-vpn-handler.sh is a replacement for update-resolv-conf... you should not combine them.

tasket commented Dec 4, 2017

qubes-vpn-handler.sh is a replacement for update-resolv-conf... you should not combine them.

@boistordu

This comment has been minimized.

Show comment
Hide comment
@boistordu

boistordu Dec 4, 2017

how okey sorry about that. I did not think that it would exactly the same thing. I'm going to try

how okey sorry about that. I did not think that it would exactly the same thing. I'm going to try

@boistordu

This comment has been minimized.

Show comment
Hide comment
@boistordu

boistordu Dec 4, 2017

there is now only the second part... still no more than 4 lines in the chain of iptables. I'm going to try the dns name resolving in another vm connected to it

there is now only the second part... still no more than 4 lines in the chain of iptables. I'm going to try the dns name resolving in another vm connected to it

@boistordu

This comment has been minimized.

Show comment
Hide comment
@boistordu

boistordu Dec 4, 2017

still no luck. did I write something wrong in my lines ?

still no luck. did I write something wrong in my lines ?

@boistordu

This comment has been minimized.

Show comment
Hide comment
@boistordu

boistordu Dec 4, 2017

not working with debian and fedora

not working with debian and fedora

@boistordu

This comment has been minimized.

Show comment
Hide comment
@boistordu

boistordu Dec 4, 2017

Dec 04 01:21:52 VPN-test openvpn[1097]: OPTIONS IMPORT: route options modified
Dec 04 01:21:52 VPN-test openvpn[1097]: OPTIONS IMPORT: route-related options modified
Dec 04 01:21:52 VPN-test kernel: tun: Universal TUN/TAP device driver, 1.6
Dec 04 01:21:52 VPN-test kernel: tun: (C) 1999-2004 Max Krasnyansky <maxk@qualcomm.com>
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.2977] manager: (tun0): new Tun device (/org/freedesktop/NetworkMan
Dec 04 01:21:52 VPN-test openvpn[1097]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Dec 04 01:21:52 VPN-test openvpn[1097]: OPTIONS IMPORT: peer-id set
Dec 04 01:21:52 VPN-test openvpn[1097]: OPTIONS IMPORT: adjusting link_mtu to 1657
Dec 04 01:21:52 VPN-test openvpn[1097]: OPTIONS IMPORT: data channel crypto options modified
Dec 04 01:21:52 VPN-test openvpn[1097]: Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 04 01:21:52 VPN-test openvpn[1097]: Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 04 01:21:52 VPN-test openvpn[1097]: ROUTE_GATEWAY 10.137.1.1
Dec 04 01:21:52 VPN-test openvpn[1097]: TUN/TAP device tun0 opened
Dec 04 01:21:52 VPN-test systemd-networkd[299]: tun0: Gained carrier
Dec 04 01:21:52 VPN-test openvpn[1097]: TUN/TAP TX queue length set to 100
Dec 04 01:21:52 VPN-test systemd-timesyncd[500]: Network configuration changed, trying to establish connection.
Dec 04 01:21:52 VPN-test openvpn[1097]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Dec 04 01:21:52 VPN-test systemd-resolved[682]: Switching to system DNS server 10.137.1.1.
Dec 04 01:21:52 VPN-test openvpn[1097]: /sbin/ip link set dev tun0 up mtu 1500
Dec 04 01:21:52 VPN-test systemd-networkd[299]: tun0: Gained IPv6LL
Dec 04 01:21:52 VPN-test openvpn[1097]: /sbin/ip addr add dev tun0 10.8.8.31/24 broadcast 10.8.8.255
Dec 04 01:21:52 VPN-test systemd-timesyncd[500]: Network configuration changed, trying to establish connection.
Dec 04 01:21:52 VPN-test systemd-timesyncd[500]: Network configuration changed, trying to establish connection.
Dec 04 01:21:52 VPN-test openvpn[1097]: qubes-vpn-handler.sh up tun0 1500 1585 10.8.8.31 255.255.255.0 init
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.3193] device (tun0): state change: unmanaged -> unavailable (reaso
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.3215] keyfile: add connection in-memory (e506bf03-686e-4914-874d-3
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.3235] device (tun0): state change: unavailable -> disconnected (re
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.3248] device (tun0): Activation: starting connection 'tun0' (e506b
Dec 04 01:21:52 VPN-test systemd-timesyncd[500]: Network configuration changed, trying to establish connection.
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.3325] device (tun0): state change: disconnected -> prepare (reason
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.3356] device (tun0): state change: prepare -> config (reason 'none
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.3375] device (tun0): state change: config -> ip-config (reason 'no
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.3397] device (tun0): state change: ip-config -> ip-check (reason '
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.3420] device (tun0): state change: ip-check -> secondaries (reason
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.3438] device (tun0): state change: secondaries -> activated (reaso
Dec 04 01:21:52 VPN-test su[1112]: Successful su for user by root
Dec 04 01:21:52 VPN-test su[1112]: + ??? root:user
Dec 04 01:21:52 VPN-test su[1112]: pam_unix(su:session): session opened for user user by (uid=0)
Dec 04 01:21:52 VPN-test systemd[1]: Started Session c5 of user user.
Dec 04 01:21:52 VPN-test systemd-logind[536]: New session c5 of user user.
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.3730] device (tun0): Activation: successful, device activated.
Dec 04 01:21:52 VPN-test nm-dispatcher[696]: req:4 'up' [tun0]: new request (3 scripts)
Dec 04 01:21:52 VPN-test su[1112]: pam_unix(su:session): session closed for user user
Dec 04 01:21:52 VPN-test openvpn[1097]: /sbin/ip route add someip/32 via 10.137.1.1
Dec 04 01:21:52 VPN-test openvpn[1097]: /sbin/ip route add 0.0.0.0/1 via 10.8.8.1
Dec 04 01:21:52 VPN-test systemd-logind[536]: Removed session c5.
Dec 04 01:21:52 VPN-test openvpn[1097]: /sbin/ip route add 128.0.0.0/1 via 10.8.8.1
Dec 04 01:21:52 VPN-test openvpn[1097]: Initialization Sequence Completed
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.6016] manager: startup complete
Dec 04 01:21:52 VPN-test systemd[1]: Started Network Manager Wait Online.
Dec 04 01:21:52 VPN-test openvpn[1097]: OPTIONS IMPORT: route options modified
Dec 04 01:21:52 VPN-test openvpn[1097]: OPTIONS IMPORT: route-related options modified
Dec 04 01:21:52 VPN-test kernel: tun: Universal TUN/TAP device driver, 1.6
Dec 04 01:21:52 VPN-test kernel: tun: (C) 1999-2004 Max Krasnyansky <maxk@qualcomm.com>
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.2977] manager: (tun0): new Tun device (/org/freedesktop/NetworkMan
Dec 04 01:21:52 VPN-test openvpn[1097]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Dec 04 01:21:52 VPN-test openvpn[1097]: OPTIONS IMPORT: peer-id set
Dec 04 01:21:52 VPN-test openvpn[1097]: OPTIONS IMPORT: adjusting link_mtu to 1657
Dec 04 01:21:52 VPN-test openvpn[1097]: OPTIONS IMPORT: data channel crypto options modified
Dec 04 01:21:52 VPN-test openvpn[1097]: Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 04 01:21:52 VPN-test openvpn[1097]: Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 04 01:21:52 VPN-test openvpn[1097]: ROUTE_GATEWAY 10.137.1.1
Dec 04 01:21:52 VPN-test openvpn[1097]: TUN/TAP device tun0 opened
Dec 04 01:21:52 VPN-test systemd-networkd[299]: tun0: Gained carrier
Dec 04 01:21:52 VPN-test openvpn[1097]: TUN/TAP TX queue length set to 100
Dec 04 01:21:52 VPN-test systemd-timesyncd[500]: Network configuration changed, trying to establish connection.
Dec 04 01:21:52 VPN-test openvpn[1097]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Dec 04 01:21:52 VPN-test systemd-resolved[682]: Switching to system DNS server 10.137.1.1.
Dec 04 01:21:52 VPN-test openvpn[1097]: /sbin/ip link set dev tun0 up mtu 1500
Dec 04 01:21:52 VPN-test systemd-networkd[299]: tun0: Gained IPv6LL
Dec 04 01:21:52 VPN-test openvpn[1097]: /sbin/ip addr add dev tun0 10.8.8.31/24 broadcast 10.8.8.255
Dec 04 01:21:52 VPN-test systemd-timesyncd[500]: Network configuration changed, trying to establish connection.
Dec 04 01:21:52 VPN-test systemd-timesyncd[500]: Network configuration changed, trying to establish connection.
Dec 04 01:21:52 VPN-test openvpn[1097]: qubes-vpn-handler.sh up tun0 1500 1585 10.8.8.31 255.255.255.0 init
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.3193] device (tun0): state change: unmanaged -> unavailable (reaso
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.3215] keyfile: add connection in-memory (e506bf03-686e-4914-874d-3
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.3235] device (tun0): state change: unavailable -> disconnected (re
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.3248] device (tun0): Activation: starting connection 'tun0' (e506b
Dec 04 01:21:52 VPN-test systemd-timesyncd[500]: Network configuration changed, trying to establish connection.
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.3325] device (tun0): state change: disconnected -> prepare (reason
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.3356] device (tun0): state change: prepare -> config (reason 'none
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.3375] device (tun0): state change: config -> ip-config (reason 'no
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.3397] device (tun0): state change: ip-config -> ip-check (reason '
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.3420] device (tun0): state change: ip-check -> secondaries (reason
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.3438] device (tun0): state change: secondaries -> activated (reaso
Dec 04 01:21:52 VPN-test su[1112]: Successful su for user by root
Dec 04 01:21:52 VPN-test su[1112]: + ??? root:user
Dec 04 01:21:52 VPN-test su[1112]: pam_unix(su:session): session opened for user user by (uid=0)
Dec 04 01:21:52 VPN-test systemd[1]: Started Session c5 of user user.
Dec 04 01:21:52 VPN-test systemd-logind[536]: New session c5 of user user.
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.3730] device (tun0): Activation: successful, device activated.
Dec 04 01:21:52 VPN-test nm-dispatcher[696]: req:4 'up' [tun0]: new request (3 scripts)
Dec 04 01:21:52 VPN-test su[1112]: pam_unix(su:session): session closed for user user
Dec 04 01:21:52 VPN-test openvpn[1097]: /sbin/ip route add someip/32 via 10.137.1.1
Dec 04 01:21:52 VPN-test openvpn[1097]: /sbin/ip route add 0.0.0.0/1 via 10.8.8.1
Dec 04 01:21:52 VPN-test systemd-logind[536]: Removed session c5.
Dec 04 01:21:52 VPN-test openvpn[1097]: /sbin/ip route add 128.0.0.0/1 via 10.8.8.1
Dec 04 01:21:52 VPN-test openvpn[1097]: Initialization Sequence Completed
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.6016] manager: startup complete
Dec 04 01:21:52 VPN-test systemd[1]: Started Network Manager Wait Online.

boistordu commented Dec 4, 2017

Dec 04 01:21:52 VPN-test openvpn[1097]: OPTIONS IMPORT: route options modified
Dec 04 01:21:52 VPN-test openvpn[1097]: OPTIONS IMPORT: route-related options modified
Dec 04 01:21:52 VPN-test kernel: tun: Universal TUN/TAP device driver, 1.6
Dec 04 01:21:52 VPN-test kernel: tun: (C) 1999-2004 Max Krasnyansky <maxk@qualcomm.com>
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.2977] manager: (tun0): new Tun device (/org/freedesktop/NetworkMan
Dec 04 01:21:52 VPN-test openvpn[1097]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Dec 04 01:21:52 VPN-test openvpn[1097]: OPTIONS IMPORT: peer-id set
Dec 04 01:21:52 VPN-test openvpn[1097]: OPTIONS IMPORT: adjusting link_mtu to 1657
Dec 04 01:21:52 VPN-test openvpn[1097]: OPTIONS IMPORT: data channel crypto options modified
Dec 04 01:21:52 VPN-test openvpn[1097]: Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 04 01:21:52 VPN-test openvpn[1097]: Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 04 01:21:52 VPN-test openvpn[1097]: ROUTE_GATEWAY 10.137.1.1
Dec 04 01:21:52 VPN-test openvpn[1097]: TUN/TAP device tun0 opened
Dec 04 01:21:52 VPN-test systemd-networkd[299]: tun0: Gained carrier
Dec 04 01:21:52 VPN-test openvpn[1097]: TUN/TAP TX queue length set to 100
Dec 04 01:21:52 VPN-test systemd-timesyncd[500]: Network configuration changed, trying to establish connection.
Dec 04 01:21:52 VPN-test openvpn[1097]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Dec 04 01:21:52 VPN-test systemd-resolved[682]: Switching to system DNS server 10.137.1.1.
Dec 04 01:21:52 VPN-test openvpn[1097]: /sbin/ip link set dev tun0 up mtu 1500
Dec 04 01:21:52 VPN-test systemd-networkd[299]: tun0: Gained IPv6LL
Dec 04 01:21:52 VPN-test openvpn[1097]: /sbin/ip addr add dev tun0 10.8.8.31/24 broadcast 10.8.8.255
Dec 04 01:21:52 VPN-test systemd-timesyncd[500]: Network configuration changed, trying to establish connection.
Dec 04 01:21:52 VPN-test systemd-timesyncd[500]: Network configuration changed, trying to establish connection.
Dec 04 01:21:52 VPN-test openvpn[1097]: qubes-vpn-handler.sh up tun0 1500 1585 10.8.8.31 255.255.255.0 init
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.3193] device (tun0): state change: unmanaged -> unavailable (reaso
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.3215] keyfile: add connection in-memory (e506bf03-686e-4914-874d-3
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.3235] device (tun0): state change: unavailable -> disconnected (re
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.3248] device (tun0): Activation: starting connection 'tun0' (e506b
Dec 04 01:21:52 VPN-test systemd-timesyncd[500]: Network configuration changed, trying to establish connection.
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.3325] device (tun0): state change: disconnected -> prepare (reason
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.3356] device (tun0): state change: prepare -> config (reason 'none
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.3375] device (tun0): state change: config -> ip-config (reason 'no
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.3397] device (tun0): state change: ip-config -> ip-check (reason '
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.3420] device (tun0): state change: ip-check -> secondaries (reason
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.3438] device (tun0): state change: secondaries -> activated (reaso
Dec 04 01:21:52 VPN-test su[1112]: Successful su for user by root
Dec 04 01:21:52 VPN-test su[1112]: + ??? root:user
Dec 04 01:21:52 VPN-test su[1112]: pam_unix(su:session): session opened for user user by (uid=0)
Dec 04 01:21:52 VPN-test systemd[1]: Started Session c5 of user user.
Dec 04 01:21:52 VPN-test systemd-logind[536]: New session c5 of user user.
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.3730] device (tun0): Activation: successful, device activated.
Dec 04 01:21:52 VPN-test nm-dispatcher[696]: req:4 'up' [tun0]: new request (3 scripts)
Dec 04 01:21:52 VPN-test su[1112]: pam_unix(su:session): session closed for user user
Dec 04 01:21:52 VPN-test openvpn[1097]: /sbin/ip route add someip/32 via 10.137.1.1
Dec 04 01:21:52 VPN-test openvpn[1097]: /sbin/ip route add 0.0.0.0/1 via 10.8.8.1
Dec 04 01:21:52 VPN-test systemd-logind[536]: Removed session c5.
Dec 04 01:21:52 VPN-test openvpn[1097]: /sbin/ip route add 128.0.0.0/1 via 10.8.8.1
Dec 04 01:21:52 VPN-test openvpn[1097]: Initialization Sequence Completed
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.6016] manager: startup complete
Dec 04 01:21:52 VPN-test systemd[1]: Started Network Manager Wait Online.
Dec 04 01:21:52 VPN-test openvpn[1097]: OPTIONS IMPORT: route options modified
Dec 04 01:21:52 VPN-test openvpn[1097]: OPTIONS IMPORT: route-related options modified
Dec 04 01:21:52 VPN-test kernel: tun: Universal TUN/TAP device driver, 1.6
Dec 04 01:21:52 VPN-test kernel: tun: (C) 1999-2004 Max Krasnyansky <maxk@qualcomm.com>
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.2977] manager: (tun0): new Tun device (/org/freedesktop/NetworkMan
Dec 04 01:21:52 VPN-test openvpn[1097]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Dec 04 01:21:52 VPN-test openvpn[1097]: OPTIONS IMPORT: peer-id set
Dec 04 01:21:52 VPN-test openvpn[1097]: OPTIONS IMPORT: adjusting link_mtu to 1657
Dec 04 01:21:52 VPN-test openvpn[1097]: OPTIONS IMPORT: data channel crypto options modified
Dec 04 01:21:52 VPN-test openvpn[1097]: Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 04 01:21:52 VPN-test openvpn[1097]: Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 04 01:21:52 VPN-test openvpn[1097]: ROUTE_GATEWAY 10.137.1.1
Dec 04 01:21:52 VPN-test openvpn[1097]: TUN/TAP device tun0 opened
Dec 04 01:21:52 VPN-test systemd-networkd[299]: tun0: Gained carrier
Dec 04 01:21:52 VPN-test openvpn[1097]: TUN/TAP TX queue length set to 100
Dec 04 01:21:52 VPN-test systemd-timesyncd[500]: Network configuration changed, trying to establish connection.
Dec 04 01:21:52 VPN-test openvpn[1097]: do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Dec 04 01:21:52 VPN-test systemd-resolved[682]: Switching to system DNS server 10.137.1.1.
Dec 04 01:21:52 VPN-test openvpn[1097]: /sbin/ip link set dev tun0 up mtu 1500
Dec 04 01:21:52 VPN-test systemd-networkd[299]: tun0: Gained IPv6LL
Dec 04 01:21:52 VPN-test openvpn[1097]: /sbin/ip addr add dev tun0 10.8.8.31/24 broadcast 10.8.8.255
Dec 04 01:21:52 VPN-test systemd-timesyncd[500]: Network configuration changed, trying to establish connection.
Dec 04 01:21:52 VPN-test systemd-timesyncd[500]: Network configuration changed, trying to establish connection.
Dec 04 01:21:52 VPN-test openvpn[1097]: qubes-vpn-handler.sh up tun0 1500 1585 10.8.8.31 255.255.255.0 init
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.3193] device (tun0): state change: unmanaged -> unavailable (reaso
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.3215] keyfile: add connection in-memory (e506bf03-686e-4914-874d-3
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.3235] device (tun0): state change: unavailable -> disconnected (re
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.3248] device (tun0): Activation: starting connection 'tun0' (e506b
Dec 04 01:21:52 VPN-test systemd-timesyncd[500]: Network configuration changed, trying to establish connection.
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.3325] device (tun0): state change: disconnected -> prepare (reason
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.3356] device (tun0): state change: prepare -> config (reason 'none
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.3375] device (tun0): state change: config -> ip-config (reason 'no
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.3397] device (tun0): state change: ip-config -> ip-check (reason '
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.3420] device (tun0): state change: ip-check -> secondaries (reason
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.3438] device (tun0): state change: secondaries -> activated (reaso
Dec 04 01:21:52 VPN-test su[1112]: Successful su for user by root
Dec 04 01:21:52 VPN-test su[1112]: + ??? root:user
Dec 04 01:21:52 VPN-test su[1112]: pam_unix(su:session): session opened for user user by (uid=0)
Dec 04 01:21:52 VPN-test systemd[1]: Started Session c5 of user user.
Dec 04 01:21:52 VPN-test systemd-logind[536]: New session c5 of user user.
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.3730] device (tun0): Activation: successful, device activated.
Dec 04 01:21:52 VPN-test nm-dispatcher[696]: req:4 'up' [tun0]: new request (3 scripts)
Dec 04 01:21:52 VPN-test su[1112]: pam_unix(su:session): session closed for user user
Dec 04 01:21:52 VPN-test openvpn[1097]: /sbin/ip route add someip/32 via 10.137.1.1
Dec 04 01:21:52 VPN-test openvpn[1097]: /sbin/ip route add 0.0.0.0/1 via 10.8.8.1
Dec 04 01:21:52 VPN-test systemd-logind[536]: Removed session c5.
Dec 04 01:21:52 VPN-test openvpn[1097]: /sbin/ip route add 128.0.0.0/1 via 10.8.8.1
Dec 04 01:21:52 VPN-test openvpn[1097]: Initialization Sequence Completed
Dec 04 01:21:52 VPN-test NetworkManager[602]: <info>  [1512346912.6016] manager: startup complete
Dec 04 01:21:52 VPN-test systemd[1]: Started Network Manager Wait Online.
@boistordu

This comment has been minimized.

Show comment
Hide comment
@boistordu

boistordu Dec 4, 2017

at which moment should I receive the dns? maybe we could debug it like that.

at which moment should I receive the dns? maybe we could debug it like that.

@boistordu

This comment has been minimized.

Show comment
Hide comment
@boistordu

boistordu Dec 4, 2017

I reconfirm that with network manager it works and the primary dns is the gateway so in my case 10.8.8.1
so I don't why it doesn't work with your scripts.

I reconfirm that with network manager it works and the primary dns is the gateway so in my case 10.8.8.1
so I don't why it doesn't work with your scripts.

@tasket

This comment has been minimized.

Show comment
Hide comment
@tasket

tasket Dec 4, 2017

You enabled Network Manager in the same VM? Network Manager should not be running.

tasket commented Dec 4, 2017

You enabled Network Manager in the same VM? Network Manager should not be running.

@boistordu

This comment has been minimized.

Show comment
Hide comment
@boistordu

boistordu Dec 4, 2017

@tasket

This comment has been minimized.

Show comment
Hide comment
@tasket

tasket Dec 4, 2017

A popup window should appear when qubes-vpn-handler.sh is run immediately after connection. Does it?

tasket commented Dec 4, 2017

A popup window should appear when qubes-vpn-handler.sh is run immediately after connection. Does it?

@boistordu

This comment has been minimized.

Show comment
Hide comment
@boistordu

boistordu Dec 4, 2017

yes it does. Like I said the vpn connection is up and running and so I have the popup notification too.

yes it does. Like I said the vpn connection is up and running and so I have the popup notification too.

@boistordu

This comment has been minimized.

Show comment
Hide comment
@boistordu

boistordu Dec 4, 2017

I'm going to try to re-create a new appvm with a new template for VM. Maybe the problem is there.
So should I completely uninstall network-manager package? or just make all services disable and that's enough?

I'm going to try to re-create a new appvm with a new template for VM. Maybe the problem is there.
So should I completely uninstall network-manager package? or just make all services disable and that's enough?

@tasket

This comment has been minimized.

Show comment
Hide comment
@tasket

tasket Dec 4, 2017

You don't need to uninstall NM, just don't activate it in the proxyVM by adding it to the VM Settings/Services list.

Another thing you can try is to run qubes-vpn-handler.sh manually after connecting (assign your DNS numbers first):

export vpn_dns="x.x.x.x y.y.y.y"
sudo /rw/config/vpn/qubes-vpn-handler.sh

Then look at the PR-QBS chain with iptables -L -v -t nat

You could also add lines in the script to show what openvpn is actually passing to it; look at the vpn_dns variable.

tasket commented Dec 4, 2017

You don't need to uninstall NM, just don't activate it in the proxyVM by adding it to the VM Settings/Services list.

Another thing you can try is to run qubes-vpn-handler.sh manually after connecting (assign your DNS numbers first):

export vpn_dns="x.x.x.x y.y.y.y"
sudo /rw/config/vpn/qubes-vpn-handler.sh

Then look at the PR-QBS chain with iptables -L -v -t nat

You could also add lines in the script to show what openvpn is actually passing to it; look at the vpn_dns variable.

@boistordu

This comment has been minimized.

Show comment
Hide comment
@boistordu

boistordu Dec 4, 2017

okey for network -manager because the services is activated services list into the template @ NetworkManager-dispatcher.service and NetworManager.service so I didn't know if I had to do a systemctl disable or not.

for the variable, by typing env I do'nt get anythiong so where should I get this variable ?

okey for network -manager because the services is activated services list into the template @ NetworkManager-dispatcher.service and NetworManager.service so I didn't know if I had to do a systemctl disable or not.

for the variable, by typing env I do'nt get anythiong so where should I get this variable ?

@boistordu

This comment has been minimized.

Show comment
Hide comment
@boistordu

boistordu Dec 5, 2017

it's okey it worked. Apparently there was some problem with the network-manager and to restart from the beginning was the good call. Thanks for your help.

it's okey it worked. Apparently there was some problem with the network-manager and to restart from the beginning was the good call. Thanks for your help.

@boistordu boistordu closed this Dec 5, 2017

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment