On Thu, Jul 26, 2018 at 04:48:44PM -0400, Stickstoff wrote:
> Thank you for your help!
>
> On 07/26/2018 08:32 AM, Unman wrote:
> > My guess is that you have set some rules in 3.2 which cannot be set in
> > the GUI interface in 4.0. Quite probably these are blocking DNS or ICMP.
>
> Spot on, the VM I experiment with (cloned instances) has an ICMP drop rule.
>
> > If you see deny rules for ICMP or DNS, it is these that are preventing
> > the GUI from working. You can remove them by :
> > 'qvm-firewall <qube> del --rule-no X'
>
> I deleted the rule, but the GUI still grays out.
> I then deleted all rules, the GUI stayed grayed out. Restarting for good
> measure, now the Qubes Manager errors out [1]. I tried this with two
> VMs, same behavior. Deleting the (empty) firewallfile doesn't help neither.
>
> > Frankly, it's probably easier to use the command line and brush up your
> > firewall knowledge.
>
> I couldn't find any info about the qvm-firewall syntax. Is it the
> iptable syntax? A quick test didn't work.
>
> Cheers,
>
> Stickstoff
>
I believe that just a policy allow will have the GUI functional again.
If you look at the man page there's some guidance on the syntax, but
some examples may help.
'qvm-firewall <qube> list ' shows the rules.
To delete a rule:
'qvm-firewall <qube> del --rule-no X' deletes rule X
To add a rule:
'qvm-firewall <qube> add RULE'
This wil put the rule at the bottom.
To insert it in the table at position X use:
'qvm-firewall <qube> add RULE --before X'
The rule syntax is basic:
Actions are accept/drop - On their own they allow/drop everything.
You can restrict to protocols using e.g, "accept proto=tcp", and further
restrict to ports using "accept proto=tcp dstports=443". (You can use a
range for dstports but not a list)
proto can be tcp, udp or icmp
You can restrict to a destination using "accept dsthost=IP".
And , of course, combine them all:
qvm-firewall add --before 0 accept proto=tcp dstportss=443 dsthost=185.199.111.153
hth