-
-
Notifications
You must be signed in to change notification settings - Fork 48
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
iptables →nftables #5031
Comments
On R4.0 with a Fedora 32 and Debian 10 template, the following is observed:
This results in an inconsistent state between the two templates, especially when dealing with the Qubes Firewall. Most notably, on Fedora, On Debian, This divergence (Fedora 32 vs Debian Qubes templates) can potentially be resolved if qubes-core-agent-networking in Fedora 32 (4.0.58-1) instead depends on However, that update may cause users to have to update any user-specific firewall commands in their Fedora 32 AppVMs. While it is unlikely users would convert from iptables to nftables, it would be beneficial if there was less divergence among the two templates. Edit: Add link to: https://docs.fedoraproject.org/en-US/fedora/f32/release-notes/sysadmin/Networking/ |
I've a question about the following sentence:
In https://github.com/QubesOS/qubes-doc/blob/master/user/security-in-qubes/firewall.md section "Enabling networking between two qubes" are examples how to create a |
quebs-core-agent-networking depend on iptables, And debian discourage the usage of iptables:
quebs-core-agent-networking depends: (without this package, no internet in appvm/standalonvm)
|
The Debian iptables is in fact iptables (nf_tables) - not legacy
iptables. You can confirm by running iptables -V
It's an interface to nftables, and is referenced and linked from the
very page you quoted.
|
There is no debian iptables, iptables is fully not in debian anymore. (i mean in official release) What you mean is iptables when installed it will not be the legacy version but nf_tables or also called iptables-nft, This is just for backward compatibility plus some advantages of nftables.
^ This behavior as well is not recommended, Better to just use the pure nftables. According to Debian: YES NO
|
I cant see this (or your last comment) adds anything to the issue.
|
Implementation hint: see |
Reopening due to apparent regression reported in #8346. |
iptables is not installed in debian-12 anymore, so make the test working with just nft. QubesOS/qubes-issues#5031
Fixed in QubesOS/qubes-core-agent-linux#440 |
ip6tables is not installed in debian-12 anymore, so make the test working with just nft. QubesOS/qubes-issues#5031
The problem you're addressing (if any)
QubesOS uses the legacy xtables stack via iptables
Describe the solution you'd like
QubesOS should use the modern nf_tables kernel subsystem exclusively
Where is the value to a user, and who might that user be?
This is likely to be of greatest value to advanced users, but could also improve firewall throughput for those with very fast connections.
Describe alternatives you've considered
QubesOS could switch to BPF-based firewalling, but that is more complicated.
Additional context
Debian 10 uses iptables-nft by default, which implements iptables on top of nf_tables. Furthermore,
nf_tables
has features like vmaps and sets, which can provide a performance improvement.Relevant documentation you've consulted
https://wiki.nftables.org/wiki-nftables
Related, non-duplicate issues
#4991
The text was updated successfully, but these errors were encountered: