Hi,

On 05/27/2016 04:00 PM, Chris Laprise wrote:
Some notes about a VPN firewall solution...


Objectives:
* Prevent all communication between downstream vms and upstream clearnet
(eth0) when the vpn client fails or the link goes down.
* Implement vpn link as a dedicated vm, transparent to downstream vms.
* Remain compatible with conventional server names for the vpn server.
* Prevent accidental communication from non-vpn programs in vpn vm to
anywhere.
* Prevent attempted communication with non-vpn programs in the vpn vm
(appears already enforced by Qubes firewall).


Roles:
* The vpn vm is generally trusted. It is assumed its programs won't try
to impersonate openvpn (send data via port 1194), for example.

If that's a concern, you may restrict sending data to port 1194 only by the openvpn user, like so:

-A OUTPUT -p [...] -o eth0 --dport 1194 -m owner --uid-owner openvpn -j ACCEPT

The same can be done for the owner of programs doing domain name resolution.

This is of course fine if the reason a program would "impersonate" openvpn is because of a developer's mistake or a weird setup. If those programs are malicious those rules won't help much (privilege escalation, and game over for that vm).

Cheers,
Ivan



--
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-devel/eb614bef-b76c-7ceb-9f8d-545f90b84ee7%40c3i.bg.
For more options, visit https://groups.google.com/d/optout.

Reply via email to