-
-
Notifications
You must be signed in to change notification settings - Fork 48
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Suspicious nftables chain priority seems to cause undesired forward packet dropping #9711
Comments
Is that all you have in the qubes-firewall->forward chain? There should be rules for each connected appvm, with just "accept" rule by default (unless you configure something else with qvm-firewall tool). If you don't have them, check if |
Yes, that's all I had, and no I never used
|
Ah OK here's the cause for the |
I created a documentation improvement suggestion . Closing this issue. |
Qubes OS release R4.2.3
Brief summary
Following instructions for networking between AppVMs as described here, doesn't necessarily lead to success. Modifying the suspicious-looking nftables chain
qubes-firewall forward
resolves the issue.Steps to reproduce
Probably not always reproducible, because the apparent problem is with non-determined priorities between the two nftables chains below:
The two priorities
filter
of these chains are equal, so that the order of execution as far as I know is undetermined. A packet withct state = new
and coming from interfacevif59.0
will be rejected by theforward
chain in thequbes-firewall
table.I experienced not being able to ping between two AppVMs, and
tcpdump -i any
, running on a persistent firewall between them, logs lines showing echo requests coming into the firewall, but not going out, i.e. apparently not being forwarded:, even though the
custom-forward
chain was set up to allow this:Expected behavior
Ping forwarding is expected to work when following said instructions.
Actual behavior
Ping doesn't work, but can be made to work by executing
Hint at root cause
Since the original two
forward
chains in tablesqubes
andqubes-firewall
have equal priority, their execution order is indeterminate and thequbes-firewall forward
chain may run before thequbes forward
chain, droppingnew
packets. This is evidenced by that modification of thequbes-firewall forward
chain mentioned aboveThe text was updated successfully, but these errors were encountered: