-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
qvm-port-forward QUBESRPC error #1
Comments
I am glad I could be helpful. Please note the warning in the main readme, this project is testing only, so be careful, especially about data loss and future breaking changes I might do. If you are comfortable with that, than enjoy the project. PS: I think sys-syncthing is done, but as you have just found, port forwarding is broke.
I don't think you are missing any policies, dom0 is running About debugging this, I have never encountered this issue before... To debug, you can run the script with sh -x /usr/local/bin/qvm-port-forward ARGS to see where it is failing. Example: sh -x /usr/local/bin/qvm-port-forward qvm-port-forward -a add -q sys-syncthing -n tcp -p 22000 2>&1 | tee /tmp/qpf.log Take a look at There are no rules in This is what you should have seen instead: [user@dom0 ~]
$ qvm-port-forward -a add -q sys-syncthing -n tcp -p 22000
info: sys-syncthing: adding input rule daddr 10.137.0.79
info: sys-pihole: adding forward rule dev eth0 saddr 192.168.2.0/24 daddr 10.137.0.79
info: disp-sys-net: adding forward rule dev wls7 saddr 192.168.2.0/24 daddr 10.137.0.104 For further debugging, please answer the following questions:
|
I am totally aware that this is not something you would describe as "production ready". But i do have backups of several other qubes i depend on in case something breaks. |
It doesn't work because Mirage Firewall does not have a proper shell, it basically only can be a netvm and use the Qubes Firewall, but custom Firewall via rewriting with Nftables does not work. See: Maybe comment there asking for the feature, but I find it difficult to implement on the mirage side especially the persistentence of rules, where they don't have a proper file system. A better implementation would be if this was done on the Qubes API side, but this is also a feature request for Qubes... I dont know of a perfect solution of how I can block starting the script if a netvm in the chain is not supported, such as Mirage. Grepping for the word Mirage is not a good solution because many other unsupported options can exist, such as a Unix distro OS integrated virtualized with HVM that was installed from an ISO, such as OpenBSD, might also not work. A good enough solution for me, would be to fail early if the following command fails: qvm-run -p disp-sys-mirage-firewall echo test But this is not perfect, in case the VM has a shell but firewall is not managed by Qubes. I will implement this as a fail-early mechanism with an error message that a certain netvm in chain doesn't support port forwarding. |
Switching the Firewall qube solved the issue! Thanks for your help and time! |
Happens with Mirage Unikernel, as it doesn't have a proper shell. Fixes: #1
Happens with Mirage Unikernel, as it doesn't have a proper shell. Fixes: #1
Hey there, thanks for the inspiration and contribution!
It helped me to understand saltstack better and getting my fresh 4.2 up and ready in no time!
However i stumbled into some trouble when using the qvm-port-forward command.
Using
qvm-port-forward -a add -q sys-syncthing -n tcp -p 22000
throws me the following error:
Is there just a policy missing and how would look such a policy that allows to use the port forwarding command from dom0?
How do i debug this or where do i have to look if the nessecary rules got created and how to remove this if the command isnt working but in case has created some rules....?
I couldnt find anything related to port forwarding in the "sys-net" qube
The text was updated successfully, but these errors were encountered: