Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upqubes-nmhook should update DNS DNAT rules after a VPN disconnects #3955
Comments
andrewdavidwong
added
bug
C: core
labels
Jun 3, 2018
andrewdavidwong
added this to the Release 4.0 updates milestone
Jun 3, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
tasket
Jun 8, 2018
Note:
It appears the disconnection behavior for qubes-core-agent-network-manager hasn't been considered until now, because there is no scripted down action.
In contrast, qubes-tunnel and related VPN handlers are written with the expectation that any transition to a 'down' state must leave all traffic blocked. In this configuration the solution for an appVM that moves between clearnet and tunnel (not advisable in many use cases) is to change the appVM's netvm setting as needed.
Suggest keeping this in mind when the Network Manager 'down' action is implemented, as its probably best to remain consistent and block traffic on 'down' for security reasons... at least as the default behavior.
tasket
commented
Jun 8, 2018
|
Note: It appears the disconnection behavior for qubes-core-agent-network-manager hasn't been considered until now, because there is no scripted In contrast, qubes-tunnel and related VPN handlers are written with the expectation that any transition to a 'down' state must leave all traffic blocked. In this configuration the solution for an appVM that moves between clearnet and tunnel (not advisable in many use cases) is to change the appVM's Suggest keeping this in mind when the Network Manager 'down' action is implemented, as its probably best to remain consistent and block traffic on 'down' for security reasons... at least as the default behavior. |
mattmccutchen commentedJun 3, 2018
•
edited
Edited 1 time
-
mattmccutchen
edited Jun 3, 2018 (most recent)
-
mattmccutchen
created Jun 3, 2018
Qubes OS version:
R4.0
Affected component(s):
qubes-core-agent-network-manager
Steps to reproduce the behavior:
Expected behavior:
In step 2, qubes-nmhook calls qubes-setup-dnat-to-ns to change the DNAT rules back to the non-VPN DNS servers, and step 3 succeeds.
Actual behavior:
In step 2, qubes-nmhook does not call qubes-setup-dnat-to-ns, and step 3 tries to use the VPN's DNS servers, which may fail.
General notes:
The following sequence of calls was made to qubes-nmhook when I connected and disconnected my VPN:
So maybe it would be sufficient to check for an action of
uporvpn-down.A workaround is to disconnect and reconnect the underlying network interface.
Related issues:
#3135