-
-
Notifications
You must be signed in to change notification settings - Fork 48
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
It's impossible to set firewall policy and rules atomically #2869
Labels
Milestone
Comments
marmarek
added
C: core
enhancement
P: major
Priority: major. Between "default" and "critical" in severity.
labels
Jun 26, 2017
marmarek
added a commit
to QubesOS/qubes-doc
that referenced
this issue
Jun 26, 2017
marmarek
added a commit
to marmarek/qubes-core-admin
that referenced
this issue
Jun 26, 2017
In the end firewall is implemented as .Get and .Set rules, with policy statically set to 'drop'. This way allow atomic firewall updates. Since we already have appropriate firewall format handling in qubes.firewall module - reuse it from there, but adjust the code to be prepared for potentially malicious input. And also mark such variables with untrusted_ prefix. There is also third method: .Reload - which cause firewall reload without making any change. QubesOS/qubes-issues#2622 Fixes QubesOS/qubes-issues#2869
marmarek
added a commit
to marmarek/qubes-core-admin-client
that referenced
this issue
Jun 26, 2017
Firewall policy is now hardcoded to 'drop'. Keep the property, so anyone trying to assign it will get an exception QubesOS/qubes-issues#2869
marmarek
added a commit
to marmarek/qubes-core-admin-client
that referenced
this issue
Jun 26, 2017
Follow the API removal QubesOS/qubes-issues#2869
Automated announcement from builder-github The package
|
marmarek
added a commit
to marmarek/qubes-core-admin-client
that referenced
this issue
Jul 5, 2017
Firewall policy is now hardcoded to 'drop'. Keep the property, so anyone trying to assign it will get an exception QubesOS/qubes-issues#2869
marmarek
added a commit
to marmarek/qubes-core-admin-client
that referenced
this issue
Jul 5, 2017
Follow the API removal QubesOS/qubes-issues#2869
This was referenced Jul 30, 2019
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
Sometimes it's useful to update firewall rules while VM is running. In this case, it's important to atomically set the firewall - especially when VM have some traffic filtered, it should not have access to those targets also during loading new firewall.
Having separate policy (default action) and actual rules makes it hard.
Safer alternative: always have policy "drop" and optionally put "always allow" rule at the end.
The text was updated successfully, but these errors were encountered: