dom0/qvm-firewall: provide vif name by QubesVM
This commit is contained in:
parent
370c4952ce
commit
c13c1c920f
@ -386,6 +386,14 @@ class QubesVm(object):
|
||||
else:
|
||||
return None
|
||||
|
||||
@property
|
||||
def vif(self):
|
||||
if not self.is_running():
|
||||
return None
|
||||
if self.netvm_vm is None:
|
||||
return None
|
||||
return "vif{0}.+".format(self.xid)
|
||||
|
||||
def is_updateable(self):
|
||||
return self.updateable
|
||||
|
||||
@ -1825,8 +1833,12 @@ class QubesProxyVm(QubesNetVm):
|
||||
if xid < 0: # VM not active ATM
|
||||
continue
|
||||
|
||||
vif = vm.vif
|
||||
if vif is None:
|
||||
continue
|
||||
|
||||
iptables += "# '{0}' VM:\n".format(vm.name)
|
||||
iptables += "-A FORWARD ! -s {0}/32 -i vif{1}.+ -j DROP\n".format(vm.ip, xid)
|
||||
iptables += "-A FORWARD ! -s {0}/32 -i {1} -j DROP\n".format(vm.ip, vif)
|
||||
|
||||
accept_action = "ACCEPT"
|
||||
reject_action = "REJECT --reject-with icmp-host-prohibited"
|
||||
@ -1839,7 +1851,7 @@ class QubesProxyVm(QubesNetVm):
|
||||
rules_action = accept_action
|
||||
|
||||
for rule in conf["rules"]:
|
||||
iptables += "-A FORWARD -i vif{0}.+ -d {1}".format(xid, rule["address"])
|
||||
iptables += "-A FORWARD -i {0} -d {1}".format(vif, rule["address"])
|
||||
if rule["netmask"] != 32:
|
||||
iptables += "/{0}".format(rule["netmask"])
|
||||
|
||||
@ -1854,12 +1866,12 @@ class QubesProxyVm(QubesNetVm):
|
||||
|
||||
if conf["allowDns"]:
|
||||
# PREROUTING does DNAT to NetVM DNSes, so we need self.netvm_vm. properties
|
||||
iptables += "-A FORWARD -i vif{0}.+ -p udp -d {1} --dport 53 -j ACCEPT\n".format(xid,self.netvm_vm.gateway)
|
||||
iptables += "-A FORWARD -i vif{0}.+ -p udp -d {1} --dport 53 -j ACCEPT\n".format(xid,self.netvm_vm.secondary_dns)
|
||||
iptables += "-A FORWARD -i {0} -p udp -d {1} --dport 53 -j ACCEPT\n".format(vif,self.netvm_vm.gateway)
|
||||
iptables += "-A FORWARD -i {0} -p udp -d {1} --dport 53 -j ACCEPT\n".format(vif,self.netvm_vm.secondary_dns)
|
||||
if conf["allowIcmp"]:
|
||||
iptables += "-A FORWARD -i vif{0}.+ -p icmp -j ACCEPT\n".format(xid)
|
||||
iptables += "-A FORWARD -i {0} -p icmp -j ACCEPT\n".format(vif)
|
||||
|
||||
iptables += "-A FORWARD -i vif{0}.+ -j {1}\n".format(xid, default_action)
|
||||
iptables += "-A FORWARD -i {0} -j {1}\n".format(vif, default_action)
|
||||
iptables += "COMMIT\n"
|
||||
xs.write('', "/local/domain/"+str(self.get_xid())+"/qubes_iptables_domainrules/"+str(xid), iptables)
|
||||
# no need for ending -A FORWARD -j DROP, cause default action is DROP
|
||||
|
Loading…
Reference in New Issue
Block a user