Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upIPv6 routing between AppVMs #718
Comments
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
|
Modified by joanna on 1 Aug 2013 11:52 UTC |
marmarek
added this to the Release 2 Beta 3 milestone
Mar 8, 2015
marmarek
added
enhancement
C: core
P: major
labels
Mar 8, 2015
marmarek
modified the milestones:
Release 3,
Release 2 Beta 3
Mar 8, 2015
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Mar 8, 2015
Member
Comment by marmarek on 9 Oct 2014 02:07 UTC
It looks like starting with 3.13 Linux kernel supports NAT for IPv6, so (theoretically) we can use the same scheme as for IPv4.
|
Comment by marmarek on 9 Oct 2014 02:07 UTC |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Mar 8, 2015
Member
Comment by joanna on 9 Oct 2014 21:32 UTC
I might not be up to date with all this networking stuff, but I thought the point of ipv6 was to actually not use NATing...?
|
Comment by joanna on 9 Oct 2014 21:32 UTC |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Mar 8, 2015
Member
Comment by marmarek on 9 Oct 2014 21:53 UTC
Generally yes (and I'm surprised that NAT support comes to ip6tables), but for our network scheme it is beneficial to use NAT, instead of routing. For example inter-VM connections can be configured independent of external IP address.
|
Comment by marmarek on 9 Oct 2014 21:53 UTC |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Mar 8, 2015
Member
Comment by marmarek on 20 Jan 2015 03:43 UTC
I've done some testing and it looks straightforward to support IPv6 in our VMs (using NAT). All required changes are in core-agent-linux repo, in scripts which are almost the same in R2 and R3. Additionally it is easy to make it opt-in feature (using qvm-service framework). So I propose to move this task to R2.
The only potentially problematic thing is qubes-firewall (per-VM firewall rules). Currently user can set rules based on IP(v4) or name. In case of an IPv4 rule, obviously it is not applicable to IPv6 firewall. In case of a name, it can be - if that name resolves to IPv6 address. But if not - ip6tables will fail loading such rule.
The simplest solution would be to modify qubes-firewall script (which loads that rules in firewallvm) to filter-out rules not applicable to IPv6. In most common use of non-empty firewall (default policy DROP) this shouldn't harm - at worst some traffic will be filtered (so application would fall back to IPv4).
In the future we might introduce more advanced firewall configuration, with option to set IPv4 and IPv6 rules explicitly.
|
Comment by marmarek on 20 Jan 2015 03:43 UTC The only potentially problematic thing is qubes-firewall (per-VM firewall rules). Currently user can set rules based on IP(v4) or name. In case of an IPv4 rule, obviously it is not applicable to IPv6 firewall. In case of a name, it can be - if that name resolves to IPv6 address. But if not - ip6tables will fail loading such rule. In the future we might introduce more advanced firewall configuration, with option to set IPv4 and IPv6 rules explicitly. |
marmarek
modified the milestones:
Release 3.1,
Release 3.0
May 13, 2015
marmarek
modified the milestones:
Release 3.2,
Release 3.1
Feb 8, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Feb 8, 2016
Member
@woju I think we forgot about this one when implementing "NetVM" in Qubes 4.0...
|
@woju I think we forgot about this one when implementing "NetVM" in Qubes 4.0... |
marmarek
modified the milestones:
Release 4.0,
Release 3.2
Feb 8, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
ghost
Aug 12, 2016
I'm a little bit disappointed now. I was looking forward to setup and use Qubes OS. Finally with a new machine I did this today using Qubes OS 3.2 rc 2.
I struggled a bit with networking (so my hope is I'm doing something wrong) but finally I got it working. But I did not get an IPv6 assigned (This works properly in my network).
So to be clear: This really means as of today there is no IPv6 in Quebes and for the future you are looking to NAT it ?
I would be happy to "turn" off all firewall features of Qubes OS since I got this covered by an rather extensive network setup. Is this an option ?
ghost
commented
Aug 12, 2016
|
I'm a little bit disappointed now. I was looking forward to setup and use Qubes OS. Finally with a new machine I did this today using Qubes OS 3.2 rc 2. I struggled a bit with networking (so my hope is I'm doing something wrong) but finally I got it working. But I did not get an IPv6 assigned (This works properly in my network). So to be clear: This really means as of today there is no IPv6 in Quebes and for the future you are looking to NAT it ? I would be happy to "turn" off all firewall features of Qubes OS since I got this covered by an rather extensive network setup. Is this an option ? |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Aug 13, 2016
Member
On Fri, Aug 12, 2016 at 03:30:41PM -0700, iggs0 wrote:
So to be clear: This really means as of today there is no IPv6 in Quebes and for the future you are looking to NAT it ?
Yes.
I would be happy to "turn" off all firewall features of Qubes OS since I got this covered by an rather extensive network setup. Is this an option ?
It depends what you call "all firewall features". You don't need to use
outbound traffic limiting ("Firewall" tab in VM settings). You can even
disable "qubes-firewall" service in Proxy VMs (which will really do
nothing anyway if you don't fill "Firewall" tab in VM settings).
But you can't disable NAT. This is rather unavoidable(*) with tree-like
structure of network connections between VMs (sys-net -> sys-firewall ->
AppVMs, possibly sys-whonix in between).
(*) without modifying every routing table in your LAN.
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
|
On Fri, Aug 12, 2016 at 03:30:41PM -0700, iggs0 wrote:
Yes.
It depends what you call "all firewall features". You don't need to use But you can't disable NAT. This is rather unavoidable(*) with tree-like (*) without modifying every routing table in your LAN. Best Regards, |
added a commit
to marmarek/old-qubes-core-agent-linux
that referenced
this issue
Sep 12, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
|
Script mentioned above: marmarek/qubes-core-agent-linux@789eb51 |
marmarek
referenced this issue
Jan 12, 2017
Closed
IPv6 routing between appvm and an IPv6-capable proxyvm #2570
qubesos-bot
referenced this issue
in QubesOS/updates-status
Jun 9, 2017
Closed
core-agent-linux v4.0.0 (r4.0) #68
added a commit
to marmarek/qubes-core-admin
that referenced
this issue
Dec 1, 2017
added a commit
to marmarek/qubes-core-admin
that referenced
this issue
Dec 5, 2017
added a commit
to marmarek/qubes-core-admin
that referenced
this issue
Dec 5, 2017
added a commit
to marmarek/qubes-core-admin
that referenced
this issue
Dec 5, 2017
marmarek
referenced this issue
in QubesOS/qubes-core-admin
Dec 5, 2017
Merged
Dom0 part of IPv6 support, network related changes #172
added a commit
to marmarek/qubes-core-agent-linux
that referenced
this issue
Dec 5, 2017
added a commit
to marmarek/qubes-core-agent-linux
that referenced
this issue
Dec 5, 2017
added a commit
to marmarek/qubes-core-agent-linux
that referenced
this issue
Dec 5, 2017
added a commit
to marmarek/qubes-core-agent-linux
that referenced
this issue
Dec 5, 2017
added a commit
to marmarek/qubes-core-agent-linux
that referenced
this issue
Dec 5, 2017
marmarek
referenced this issue
in QubesOS/qubes-core-agent-linux
Dec 5, 2017
Merged
VM side of IPv6 support #75
added a commit
to marmarek/qubes-core-libvirt
that referenced
this issue
Dec 5, 2017
added a commit
to marmarek/qubes-core-admin
that referenced
this issue
Dec 6, 2017
added a commit
to marmarek/qubes-core-admin
that referenced
this issue
Dec 6, 2017
added a commit
to marmarek/qubes-core-admin
that referenced
this issue
Dec 7, 2017
added a commit
to marmarek/qubes-core-admin
that referenced
this issue
Dec 7, 2017
added a commit
to marmarek/qubes-core-admin
that referenced
this issue
Dec 7, 2017
added a commit
to marmarek/qubes-core-admin
that referenced
this issue
Dec 7, 2017
marmarek
closed this
in
QubesOS/qubes-core-admin#172
Dec 10, 2017
added a commit
to marmarek/qubes-vmm-xen-stubdom-linux
that referenced
this issue
Dec 14, 2017
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Dec 15, 2017
Automated announcement from builder-github
The package qubes-core-agent_4.0.14-1+deb8u1 has been pushed to the r4.0 testing repository for the Debian jessie template.
To test this update, first enable the testing repository in /etc/apt/sources.list.d/qubes-*.list by uncommenting the line containing jessie-testing, then use the standard update command:
sudo apt-get update && sudo apt-get dist-upgrade
qubesos-bot
commented
Dec 15, 2017
|
Automated announcement from builder-github The package
|
qubesos-bot
added
the
r4.0-jessie-cur-test
label
Dec 15, 2017
qubesos-bot
referenced this issue
in QubesOS/updates-status
Dec 15, 2017
Closed
core-agent-linux v4.0.14 (r4.0) #326
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Dec 15, 2017
Automated announcement from builder-github
The package qubes-core-agent_4.0.14-1+deb9u1 has been pushed to the r4.0 testing repository for the Debian stretch template.
To test this update, first enable the testing repository in /etc/apt/sources.list.d/qubes-*.list by uncommenting the line containing stretch-testing, then use the standard update command:
sudo apt-get update && sudo apt-get dist-upgrade
qubesos-bot
commented
Dec 15, 2017
|
Automated announcement from builder-github The package
|
qubesos-bot
added
the
r4.0-stretch-cur-test
label
Dec 15, 2017
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Dec 15, 2017
Automated announcement from builder-github
The package core-agent-linux has been pushed to the r4.0 testing repository for the CentOS centos7 template.
To test this update, please install it with the following command:
sudo yum update --enablerepo=qubes-vm-r4.0-current-testing
qubesos-bot
commented
Dec 15, 2017
|
Automated announcement from builder-github The package
|
qubesos-bot
added
the
r4.0-centos7-cur-test
label
Dec 15, 2017
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Dec 15, 2017
Automated announcement from builder-github
The package python2-dnf-plugins-qubes-hooks-4.0.14-1.fc24 has been pushed to the r4.0 testing repository for the Fedora fc24 template.
To test this update, please install it with the following command:
sudo yum update --enablerepo=qubes-vm-r4.0-current-testing
qubesos-bot
commented
Dec 15, 2017
|
Automated announcement from builder-github The package
|
qubesos-bot
added
the
r4.0-fc24-cur-test
label
Dec 15, 2017
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Dec 15, 2017
Automated announcement from builder-github
The package python2-dnf-plugins-qubes-hooks-4.0.14-1.fc25 has been pushed to the r4.0 testing repository for the Fedora fc25 template.
To test this update, please install it with the following command:
sudo yum update --enablerepo=qubes-vm-r4.0-current-testing
qubesos-bot
commented
Dec 15, 2017
|
Automated announcement from builder-github The package
|
qubesos-bot
added
the
r4.0-fc25-cur-test
label
Dec 15, 2017
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Dec 15, 2017
Automated announcement from builder-github
The package python2-dnf-plugins-qubes-hooks-4.0.14-1.fc26 has been pushed to the r4.0 testing repository for the Fedora fc26 template.
To test this update, please install it with the following command:
sudo yum update --enablerepo=qubes-vm-r4.0-current-testing
qubesos-bot
commented
Dec 15, 2017
|
Automated announcement from builder-github The package
|
qubesos-bot
added
the
r4.0-fc26-cur-test
label
Dec 15, 2017
qubesos-bot
referenced this issue
in QubesOS/updates-status
Dec 22, 2017
Closed
core-admin v4.0.15 (r4.0) #327
added a commit
to marmarek/qubes-core-libvirt
that referenced
this issue
Dec 23, 2017
This was referenced Dec 23, 2017
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Jan 4, 2018
Automated announcement from builder-github
The package core-agent-linux has been pushed to the r4.0 stable repository for the Fedora centos7 template.
To install this update, please use the standard update command:
sudo yum update
qubesos-bot
commented
Jan 4, 2018
|
Automated announcement from builder-github The package
|
qubesos-bot
added
r4.0-centos7-stable
and removed
r4.0-centos7-cur-test
labels
Jan 4, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Jan 4, 2018
Automated announcement from builder-github
The package python2-dnf-plugins-qubes-hooks-4.0.15-1.fc24 has been pushed to the r4.0 stable repository for the Fedora fc24 template.
To install this update, please use the standard update command:
sudo yum update
qubesos-bot
commented
Jan 4, 2018
|
Automated announcement from builder-github The package
|
qubesos-bot
added
r4.0-fc24-stable
and removed
r4.0-fc24-cur-test
labels
Jan 4, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Jan 5, 2018
Automated announcement from builder-github
The package qubes-core-agent_4.0.15-1+deb8u1 has been pushed to the r4.0 stable repository for the Debian jessie template.
To install this update, please use the standard update command:
sudo apt-get update && sudo apt-get dist-upgrade
qubesos-bot
commented
Jan 5, 2018
|
Automated announcement from builder-github The package
|
qubesos-bot
added
r4.0-jessie-stable
and removed
r4.0-jessie-cur-test
labels
Jan 5, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Jan 5, 2018
Automated announcement from builder-github
The package qubes-core-agent_4.0.15-1+deb9u1 has been pushed to the r4.0 stable repository for the Debian stretch template.
To install this update, please use the standard update command:
sudo apt-get update && sudo apt-get dist-upgrade
qubesos-bot
commented
Jan 5, 2018
|
Automated announcement from builder-github The package
|
qubesos-bot
added
r4.0-stretch-stable
and removed
r4.0-stretch-cur-test
labels
Jan 5, 2018
qubesos-bot
added
r4.0-fc25-stable
and removed
r4.0-fc25-cur-test
labels
Feb 6, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Feb 6, 2018
Automated announcement from builder-github
The component core-agent-linux (including package python2-dnf-plugins-qubes-hooks-4.0.20-1.fc26) has been pushed to the r4.0 stable repository for the Fedora template.
To install this update, please use the standard update command:
sudo yum update
qubesos-bot
commented
Feb 6, 2018
|
Automated announcement from builder-github The component
|
marmarek commentedMar 8, 2015
Reported by joanna on 24 Feb 2013 15:33 UTC
None
Migrated-From: https://wiki.qubes-os.org/ticket/718