On 09/09/2015 09:47 AM, Unman wrote:
> On Wed, Sep 09, 2015 at 07:16:01PM +1000, theman wrote:
>> Thanks Marie for your help.
>>
>> I have the AppVM set to deny traffic except for the IP-of_webmail (I entered
>> "
roundcube.net" as a test) and also, Allow dns request and ICPM traffic.
>>
>> When I run "traceroute
roundcube.net" I get:
>>
>>
roundcube.net: Name or service not known
>> Cannot handle "host" cmdline arg `
roundcube.net' on position 1 (argc 1)
>>
>> When I allow all for 5 mins I get:
>>
>> traceroute to
roundcube.net (104.27.159.146), 30 hops max, 60 byte packets
>> 1 10.137.4.1 (10.137.4.1) 0.270 ms 0.198 ms 0.135 ms
>> 2 172.16.0.1 (172.16.0.1) 266.388 ms 267.787 ms 269.392 ms
>> 3 192.99.100.253 (192.99.100.253) 272.181 ms 274.915 ms 276.836 ms
>> 4
bhs-g2-a9.qc.ca (198.27.73.99) 277.681 ms 279.619 ms
bhs-g1-a9.qc.ca
>> (198.27.73.97) 282.042 ms
>> 5
mtl-2-6k.qc.ca (198.27.73.6) 284.753 ms 286.703 ms
mtl-2-6k.qc.ca
>> (198.27.73.4) 288.298 ms
>> 6 * * *
>> 7
xe-1-2-0.edge01.ord02.as13335.net (206.223.119.180) 286.532 ms 284.193
>> ms 285.161 ms
>> 8 104.27.159.146 (104.27.159.146) 286.912 ms 289.352 ms 290.960 ms
>>
...
>
> So this suggests that your dns resolution is borked with the vpn.
> For a quick and dirty solution just add this to /etc/hosts:
> 104.27.159.146
roundcube.net
> To make it survive reboot, put that line in /rw/config/dns and add:
> cat /rw/config/dns >> /etc/hosts
> to /rw/config/rc.local
>
> If you only use the VM to access your webmail you can turn off DNS
> and ICMP.
>
> Alternatively look at the iptables rules on the firewall and pay
> attention to what you are doing with dns. You should be directing
> traffic down the tunnel to a remore dns server: at the moment your
> ruleset is blocking it.
>
> unman
>
Marek,
There appears to be a bug in Qubes firewall dns forwarding after
'qubes-setup-dnat-to-ns' is called to update the nat PR-QBS chain /and/
there are 'Deny except...' whitelist rules added from a connected
(downstream) appvm.
The destination addresses in the Qubes-generated dpt:domain rules in the
FORWARD chain remain their old direct-to-netvm values instead of getting
updated to the vpn addresses. So those nat'd dns packets keep hitting
the 'reject-with icmp-host-prohibited' rule since they are never matched
and accepted above.
The firewall might need to be fixed so that whatever new dns addresses
are picked up by 'qubes-setup-dnat-to-ns', the dpt:domain rules in
FORWARD are also changed to look for those addresses.
Would you agree?