-
-
Notifications
You must be signed in to change notification settings - Fork 48
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Note in firewall settings that denying everything will not affect established connections #2731
Comments
Your expectations dont match mine. |
If @marmarek agrees with @unman's assessment, we'll close this as Notes:
|
This is true, but IMO it should be noted somewhere in the firewall settings. Not everyone configure firewalls daily. A side note: it is possible to write firewall rules to avoid this effect, at a cost of additional overhead for rules processing (so - every packet passing through firewall). Basically put |
Added a tooltip clarifying that changing firewall settings does not affect existing connections. fixes QubesOS/qubes-issues#2731
I agree with @starius that the "expected behaviour" should also the desired behaviour. When would you want to add a rule you don't want to take effect immediately? Why not just add it later? IMHO the fact that existing firewall systems have retarded configuration interfaces should not get in the way of making the Qubes UI reliable and consistent. |
Updated UI have (in addition) hint that if you want to isolate VM from the network completely, better set netvm to none. |
@marmarek yes, but I believe that if you want to restrict it to |
Automated announcement from builder-github The package
|
Automated announcement from builder-github The package
Or update dom0 via Qubes Manager. |
Qubes OS version (e.g.,
R3.2
):R3.2
Expected behavior:
When I choose "deny network access except..." without specifying the list of allowed targets, all current connections are dropped.
Actual behavior:
When I choose "deny network access except..." without specifying the list of allowed targets, a current connection continues working.
Steps to reproduce the behavior:
I created ProxyVM based on fedora-23 template and put an AppVM behind it. The ProxyVM had the default firewall rules (allow everything). I established SSH connection from the AppVM and then switched firewall in the ProxyVM to "deny network access except...". The SSH connection was still active, but I can't establish new SSH connections at that point.
Notes:
Current wording in the firewall configuration window is misleading. Either QubesOS should drop all current connections as well or put a big warning message saying that you have to restart all downstream VMs if you really want to block all network access.
The text was updated successfully, but these errors were encountered: