On Sun, 23 Mar 2025 06:40:23 +0000 'skiinglasso2' via qubes-devel wrote:

> There's a bug in qubes-firewall.service. It should pull in and be
> ordered before network-pre.target such that the firewall rules are
> guaranteed to be in place before the network is raised.

How do you detect the leak?

According to the same link you refer to, there is no established
network connectivity before network-online.target which starts after
network.target:

user@sys-firewall:~ > systemctl cat network-online.target | grep After
After=network.target

qubes-firewall.service starts before network.target, i.e. even earlier:

user@sys-firewall:~ > systemctl cat qubes-firewall.service | grep Before
Before=qubes-network.service
user@sys-firewall:~ > systemctl cat qubes-network.service | grep Before
Before=network.target
user@sys-firewall:~ > systemctl cat network.target | grep After
After=network-pre.target

I don't know if it is not possible (or necessary) to have it
Before=network-pre.target because the virtual interfaces (vif*) are
part of the nft rules. (See /etc/xen/scripts/vif-route-qubes)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-devel+unsubscr...@googlegroups.com.
To view this discussion visit 
https://groups.google.com/d/msgid/qubes-devel/20250323113252.37e449f8%40localhost.

Reply via email to