20210714-Re_GSoC Port Forwarding-1077.html 3.0 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253
  1. <html>
  2. <head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
  3. <title>Re: GSoC Port Forwarding</title>
  4. <link rel="important stylesheet" href="">
  5. <style>div.headerdisplayname {font-weight:bold;}
  6. </style></head>
  7. <body>
  8. <table border=0 cellspacing=0 cellpadding=0 width="100%" class="header-part1"><tr><td><div class="headerdisplayname" style="display:inline;">Oggetto: </div>Re: GSoC Port Forwarding</td></tr><tr><td><div class="headerdisplayname" style="display:inline;">Mittente: </div>Giulio <giulio@gmx.com></td></tr><tr><td><div class="headerdisplayname" style="display:inline;">Data: </div>14/07/2021, 18:27</td></tr></table><table border=0 cellspacing=0 cellpadding=0 width="100%" class="header-part2"><tr><td><div class="headerdisplayname" style="display:inline;">A: </div>Frédéric Pierret &lt;frederic.pierret@qubes-os.org&gt;, Marek Marczykowski-Górecki &lt;marmarek@invisiblethingslab.com&gt;</td></tr></table><br>
  9. <div class="moz-text-flowed" style="font-family: -moz-fixed; font-size: 14px;" lang="x-unicode">Hi,
  10. <br>
  11. <br>Il 14/07/2021 17:40, Frédéric Pierret ha scritto:
  12. <br><blockquote type=cite style="color: #007cff;">Giulio,
  13. <br>
  14. <br>Generally looks good. Do you have already some testing and working case?
  15. If yes, can you please provide few steps here (that would be also good
  16. for doc later).
  17. <br>
  18. <br></blockquote>
  19. <br>I've tested again the code that I added during the refactoring and made
  20. a couple of chanegs to make it work. I have not written any test yet,
  21. however at this stage you can test manually with the following commands
  22. in dom0:
  23. <br>
  24. <br>- # qvm-firewall &lt;domain&gt; add action=forward forwardtype=internal
  25. srcports=443-443 dstports=8443-8443 proto=tcp
  26. <br>
  27. <br>This command should add an internal forwarding rule. In pratice, as of
  28. now, the rule should be visible with the correct attributes running
  29. "qvm-firewall &lt;domain&gt;". Furthermore, the added rule should be present
  30. in the <i class="moz-txt-slash"><span class="moz-txt-tag">/</span>var/lib/qubes/appvms<span class="moz-txt-tag">/</span></i>&lt;domain&gt;/firewall.xml file too and be
  31. correctly represented. Lastly, in the untrusted_qdb of &lt;domain&gt;'s netvm
  32. there should be an entry containing the added rule in the forwarding
  33. base dir.
  34. <br>
  35. <br>- # qvm-firewall &lt;domain&gt; add action=forward forwardtype=wxternal
  36. srcports=80-80 dstports=8080-8080 proto=tcp
  37. <br>
  38. <br>This command should produce almost the exact outcome as the first one.
  39. However, in this case, a specific forward rule containing the ip address
  40. of the next hop should be present in the untrusted_qdb of each vm in the
  41. network path until the last vm where netvm is None (and thus is expected
  42. to have some kind of different interface such as eth).
  43. <br>
  44. <br>Clearly, the port forwarding itself cannot be tested until the proper
  45. handling of the relevant rules is added to the core-agent-linux. I am
  46. now working on that and I expect to have something to test more in depth
  47. in about a week.
  48. <br>
  49. <br>Cheers
  50. <br>Giulio
  51. <br></div></body>
  52. </html>
  53. </table></div>