"I would like to limit my 'banking domain to be able to talk only to http://mybank.com.pl and nothing more. Currently this cannot be done in most cases reliably."
"What I do instead, currently, I just limit those domains to https traffic. That kind of sucks."
"I think the key here is to have a (semi)trusted way of doing a reverse
IP lookup via the authoritative server for that domain and matching that
IP to the proper DNS domain name rule. Once the DNS host information is
found to match a symbolic firewall rule then a dynamically added rule
could permit subnet access to that domain. But *only* for given
organizations which are semi-trusted and preconfigured for that VM.
(e.g. BANKING-VM:*.BANK.COM SURFING_VM:*.google.com
SHOPPING_VM:*.amazon.com )This trust mechanism requires several things, mainly a way to know which
domains are allowed to be dynamically processed symbolically, and which
DNS authoritative servers can be trusted for that domain. One should not
believe just any DNS answer (e.g dns-anycast), and some form of DNS
configuration checking should be used to verify that these servers
appear to be legitimate and still configured properly."
"I would like to limit my 'banking domain to be able to talk only to http://mybank.com.pl and nothing more. Currently this cannot be done in most cases reliably."
"What I do instead, currently, I just limit those domains to https traffic. That kind of sucks."
"I think the key here is to have a (semi)trusted way of doing a reverse
IP lookup via the authoritative server for that domain and matching that
IP to the proper DNS domain name rule. Once the DNS host information is
found to match a symbolic firewall rule then a dynamically added rule
could permit subnet access to that domain. But *only* for given
organizations which are semi-trusted and preconfigured for that VM.
(e.g. BANKING-VM:*.BANK.COM SURFING_VM:*.google.com
SHOPPING_VM:*.amazon.com )This trust mechanism requires several things, mainly a way to know which
domains are allowed to be dynamically processed symbolically, and which
DNS authoritative servers can be trusted for that domain. One should not
believe just any DNS answer (e.g dns-anycast), and some form of DNS
configuration checking should be used to verify that these servers
appear to be legitimate and still configured properly."
"Using IP in browser address bar probably will not work as expected
because of HTTP details (Host: header). But setting that mapping in
/etc/hosts should work just fine."
a) [untrusted] GNOME terminal:nslookup www.jpmorgan.comreturns 159.53.85.117sudo vi /etc/hostsinserted as the first line159.53.85.117 www.jpmorgan.comb) [Dom0] Qubes VM Manager : Settings : untrusted Firewall rules :x Deny network access exceptAddress Service Protocol159.53.85.117 any anyc) [untrusted] Mozilla FirefoxURL: https://www.jpmorgan.comresult: web page loaded without problems (as expected :)result: Server not found (as expected :)I repeated the above steps for a different bank. Result: got to the first page.In order to jump to the second page, user is expected to click the drop-down list and select "on-line banking" entry. For some reason, the drop-down list doesn't behave that way. Instead, it presents one entry only.It looks like I need to allow an access to additional IP(s). But I don't know which one. I tried to figure it out based on[untrusted] tcpdump -e eth0 -nn -Q out -l | tee bank_outgoing_traffic.logHowever, the only site 'bank_outgoing_traffic.log' points out is tiles-cloudfront.cdn.mozilla.net. After executing steps a) b), and c) for this site, I am still not able to jump to the second page. Further help will be greatly appreciated.
--
You received this message because you are subscribed to the Google Groups "qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users...@googlegroups.com.
To post to this group, send email to qubes...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/1282702487.1456481.1461537799195.JavaMail.yahoo%40mail.yahoo.com.
For more options, visit https://groups.google.com/d/optout.
sudo tcpdump -i eth0 udp and dst port 53 -Q out -nn
"In Firefox open Tools > Web Developer > Network from the menu bar. (if you don't have a menu bar right click where the menu bar should be and check the box)"
1) user trusts DNS server provider. In this case, user may add names to [Dom0] Qubes VM Manager : Settings : <domain> Firewall rules. Behind the scene, these names get resolved and added to [sys-firewall] iptables. Next time, user decides to access the bank, he/she has to open [Dom0] Qubes VM Manager : Settings : <domain> Firewall rules and press "OK" button. This will resolve the names (again) and refresh IPs in [sys-firewall] iptables.2) user doesn't trusts DNS server provider. In this case, user may add IPs to [Dom0] Qubes VM Manager : : Settings : <domain> Firewall rules. User will have to validate these IPs by some method.In the later case, it would be nice to have an "assistant". This assistant will:a) query several DNS servers and compare results. If results do not match, then it will return fail status; otherwise it will return success status.b) Ideally, queries should use some encryption to avoid tampering.