20210717-Re_GSoC Port Forwarding-1087.html 2.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445
  1. <html>
  2. <head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
  3. <title>Re: GSoC Port Forwarding</title>
  4. <link rel="important stylesheet" href="">
  5. <style>div.headerdisplayname {font-weight:bold;}
  6. </style></head>
  7. <body>
  8. <table border=0 cellspacing=0 cellpadding=0 width="100%" class="header-part1"><tr><td><div class="headerdisplayname" style="display:inline;">Oggetto: </div>Re: GSoC Port Forwarding</td></tr><tr><td><div class="headerdisplayname" style="display:inline;">Mittente: </div>Giulio <giulio@gmx.com></td></tr><tr><td><div class="headerdisplayname" style="display:inline;">Data: </div>17/07/2021, 21:52</td></tr></table><table border=0 cellspacing=0 cellpadding=0 width="100%" class="header-part2"><tr><td><div class="headerdisplayname" style="display:inline;">A: </div>Frédéric Pierret &lt;frederic.pierret@qubes-os.org&gt;</td></tr><tr><td><div class="headerdisplayname" style="display:inline;">CC: </div>Marek Marczykowski-Górecki &lt;marmarek@invisiblethingslab.com&gt;</td></tr></table><br>
  9. <div class="moz-text-flowed" style="font-family: -moz-fixed; font-size: 14px;" lang="x-unicode">Hi,
  10. <br>
  11. <br>Il 17/07/2021 21:07, Frédéric Pierret ha scritto:
  12. <br><blockquote type=cite style="color: #007cff;">I've not an alternative idea yet but, I'm wondering if leaking appvm
  13. names in "higher" untrusted appvms is reasonable, especially for
  14. confidentiality. Maybe simply use the destination appvm ip, here in your
  15. example that would be personal ip. dom0/GuiVM has access to the info so
  16. getting appvm name from ip should be simple.
  17. <br></blockquote>
  18. <br>I understand. It is useful for now for me for debugging and following
  19. the rules flow, but I will think for something better that solve this
  20. problem.
  21. <br>
  22. <br><blockquote type=cite style="color: #007cff;">Here too, I'm not sure adding such info is a good idea for security.
  23. What exactly do you have in mind for the last needs additional rules?
  24. <br></blockquote>
  25. <br>Well, the last hop, such as sys-net in my last example, needs to know
  26. that it is the last hop. It has to set the 'srchost' and allow incoming
  27. connections only from the allowed ranges, while middle hops just needs
  28. to allow connections from the previous and the next hop. I have yet to
  29. look into nft enough, but I guess something else might change when
  30. dealing with the physical/external interface too. As for the first hop I
  31. have no requirements in mind so maybe that can be avoided.
  32. <br>
  33. <br><blockquote type=cite style="color: #007cff;"><blockquote type=cite style="color: #007cff;">One more thing, maybe between internal hops it makes sense to randomize
  34. <br>the forwarded ports? This way we can prevent forwarding from different
  35. <br>appvm which shares the same network path or even just one hop from
  36. <br>overlapping, at least internally. Does it makes sense for you?
  37. <br></blockquote>
  38. <br></blockquote>
  39. <br>Thanks, I will think about that too.
  40. <br>
  41. <br>Cheers
  42. <br>Giulio
  43. <br></div></body>
  44. </html>
  45. </table></div>