Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upQubes Firewall - Add rules to QBS-prefixed chain #974
Comments
marmarek
added
enhancement
C: core
P: minor
labels
May 12, 2015
marmarek
added this to the Release 3.1 milestone
May 12, 2015
marmarek
modified the milestones:
Release 3.2,
Release 3.1,
Release 4.0
Jan 19, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Feb 2, 2016
Member
Those chains could be created per-VM, making customization even easier.
Additionally -A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT rule could be put in such per-VM chain - to be able to cut existing connections when setting firewall to "deny" (see #1717)
|
Those chains could be created per-VM, making customization even easier. |
marmarek
referenced this issue
Feb 2, 2016
Closed
Changing firewall rules doesn't affect established connections #1717
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
cfcs
Feb 3, 2016
@marmarek: that sounds good!
Although I'm a bit wary of the RELATED selector, as it has port/protocol-specific side-effects - is that really needed?
cfcs
commented
Feb 3, 2016
|
@marmarek: that sounds good! |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Feb 4, 2016
Member
It is useful for example for FTP. If you want to allow only FTP output,
you need this, otherwise you'll transfer any file.
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
|
It is useful for example for FTP. If you want to allow only FTP output, Best Regards, |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
cfcs
Feb 4, 2016
Yes, if you want the kernel to parse, for example, FTP.
Coming from an FTP client, the browser, or anything else that manages to trick the ring 0 parser into believing it's speaking FTP or one of the 10-20 other protocols that the kernel contains parsers for.
I'm not so sure I'd like that.
cfcs
commented
Feb 4, 2016
|
Yes, if you want the kernel to parse, for example, FTP. |
cfcs commentedApr 27, 2015
It is a general nuisance that the Qubes firewall (with random intervals / triggered by random UI actions?) decides to add rules to INPUT, OUTPUT, FORWARD and the like.
This behavior makes a complete mess of any custom rules for that domain.
Having specific chains for the Qubes firewall rules would allow us to have
-j RETURNtargets instead of-j ACCEPTfor the automatically generated rules.The
-j ACCEPTforces custom rule writers to end policies that don't permit random packets through to end the list of custom rules with-j DROP, effectively disabling the UI-set policies.Thoughts?