‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
On Sunday, June 30, 2019 10:36 PM, Chris Laprise <
tas...@posteo.net> wrote:
> On 6/30/19 4:10 PM, Chris Laprise wrote:
>
> > > > A shortcut you can take to setting up iptables for DNS is to populate
> > > > /etc/resolv.conf and then run '/usr/lib/qubes/qubes-setup-dnat-to-ns'.
> > > > This should configure the nat/PR-QBS chain with the DNS addresses you
> > > > set.
> >
> > So check that your DoT setup is updating /etc/resolv.conf, then run
> > '/usr/lib/qubes/qubes-setup-dnat-to-ns'.
Thanks for you suggestion. Apparently, it does not work in sys-net.
Stubby is up, working and connected to its default DoT providers (as lsof -i asserts):
COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME
stubby 534 stubby 3u IPv4 17946 0t0 UDP localhost:domain
stubby 534 stubby 4u IPv4 17947 0t0 TCP localhost:domain (LISTEN)
stubby 534 stubby 5u IPv6 17948 0t0 UDP localhost:domain
stubby 534 stubby 6u IPv6 17949 0t0 TCP localhost:domain (LISTEN)
stubby 534 stubby 7u IPv4 35444 0t0 TCP sys-net:46006->145.100.185.16:domain-s (ESTABLISHED)
stubby 534 stubby 8u IPv4 35447 0t0 TCP sys-net:45550->getdnsapi.net:domain-s (ESTABLISHED)
NetworkMa 564 root 17u IPv4 31022 0t0 UDP sys-net:bootpc
systemd-r 647 systemd-resolve 11u IPv4 19350 0t0 UDP *:hostmon
systemd-r 647 systemd-resolve 12u IPv4 19351 0t0 TCP *:hostmon (LISTEN)
systemd-r 647 systemd-resolve 13u IPv6 19353 0t0 UDP *:hostmon
systemd-r 647 systemd-resolve 14u IPv6 19354 0t0 TCP *:hostmon (LISTEN)
systemd-r 647 systemd-resolve 16u IPv4 19358 0t0 UDP 127.0.0.53:domain
systemd-r 647 systemd-resolve 17u IPv4 19359 0t0 TCP 127.0.0.53:domain (LISTEN)
tinyproxy 1547 tinyproxy 4u IPv4 32068 0t0 TCP *:us-cli (LISTEN)
tinyproxy 1547 tinyproxy 5u IPv6 32069 0t0 TCP *:us-cli (LISTEN)
tinyproxy 1548 tinyproxy 4u IPv4 32068 0t0 TCP *:us-cli (LISTEN)
tinyproxy 1548 tinyproxy 5u IPv6 32069 0t0 TCP *:us-cli (LISTEN)
tinyproxy 1549 tinyproxy 4u IPv4 32068 0t0 TCP *:us-cli (LISTEN)
Also, nano claims that everything is right in /etc/resolv.conf
# Generated by NetworkManager
nameserver 127.0.0.1
nameserver ::1
As root, I run /usr/lib/qubes/qubes-setup-dnat-to-ns . Everything looks fine.
I can ping the outside world but sys-net does not receive any request from my qubes :-(
> Additional thought: The sys-net VM may not be the best place to secure
> any data, DNS included. Putting DoT in sys-firewall or similar proxyVM
> (and using qubes-setup-dnat-to-ns there) would be a better choice and
> has a fair chance of working.
OK, will try tomorrow with sys-firewall and see what happens.