-
-
Notifications
You must be signed in to change notification settings - Fork 53
Open
Labels
C: Qubes GUI toolsThis issue pertains to Qubes GUI tools such as the Qube Manager and Qubes widgets.This issue pertains to Qubes GUI tools such as the Qube Manager and Qubes widgets.P: defaultPriority: default. Default priority for new issues, to be replaced given sufficient information.Priority: default. Default priority for new issues, to be replaced given sufficient information.help wantedThis issue will probably not get done in a timely fashion without help from community contributors.This issue will probably not get done in a timely fashion without help from community contributors.uxThis issue pertains to the user experience (UX) in Qubes OS.This issue pertains to the user experience (UX) in Qubes OS.
Description
I know this is going to sound crazy, but I have tested it on various VMs with freshly installed templates provided from Qubes with freshly cloned AppVMs and it is reproducible.
Qubes OS version:
4.0
Affected component(s):
sys-firewall I assume
Steps to reproduce the behavior:
- Download / install default fedora28 templates via the qubes-update command
- Assign sys-net, sys-firewall, and an appVM to the freshly installed fedora28 template
- In the AppVM: open up firefox and browse the web. Open the browser to reddit.com, and it will be working. Keep reddit.com open
- In the AppVM Qubes Configure: go to Firewall tab and click "Limit outgoing connects to ..." and Apply
- Continue browser reddit.com. You will observe that reddit.com still is browsable
- Open up a new Tab and go to another domain such as ford.com or whatever. This request will be blocked
- Open the terminal in the AppVM. Type ping reddit.com and addresses can still ping
- Go back to Qubes firewall config and configure it to allow otugoing connections
- Reload the previously blocked ford.com and it will work now
Expected behavior:
All internet should be cut from the VM. That includes previously connected IP addresses, future connected IP addresses, and different internet protocols
Actual behavior:
Previously connected IPs not blocked. Only HTTP/HTTPS traffic to new IPs is blocked.
Metadata
Metadata
Assignees
Labels
C: Qubes GUI toolsThis issue pertains to Qubes GUI tools such as the Qube Manager and Qubes widgets.This issue pertains to Qubes GUI tools such as the Qube Manager and Qubes widgets.P: defaultPriority: default. Default priority for new issues, to be replaced given sufficient information.Priority: default. Default priority for new issues, to be replaced given sufficient information.help wantedThis issue will probably not get done in a timely fashion without help from community contributors.This issue will probably not get done in a timely fashion without help from community contributors.uxThis issue pertains to the user experience (UX) in Qubes OS.This issue pertains to the user experience (UX) in Qubes OS.