On 08/21/2017 07:32 PM, PhR wrote:

Chain ciscovpn (3 references)
target     prot opt source               destination
ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED
ACCEPT     all  --  anywhere             anywhere
ACCEPT     all  --  anywhere             anywhere
ACCEPT udp -- anywhere anywhere udp spt:bootpc dpt:bootps ACCEPT udp -- anywhere anywhere udp spt:bootps dpt:bootpc ACCEPT udp -- anywhere anywhere udp spt:dhcpv6-client dpt:dhcpv6-server ACCEPT udp -- anywhere anywhere udp spt:dhcpv6-server dpt:dhcpv6-client ACCEPT tcp -- 10.137.2.26 213.xxx.xxx.xxx tcp dpt:https ACCEPT tcp -- 213.xxx.xxx.xxx 10.137.2.26 tcp spt:https ACCEPT udp -- 10.137.2.26 213.xxx.xxx.xxx udp dpt:https ACCEPT udp -- 213.xxx.xxx.xxx 10.137.2.26 udp spt:https
RETURN     all  --  10.137.2.26          anywhere
RETURN     all  --  anywhere             10.137.2.26
RETURN     all  --  10.137.2.26          10.137.2.26
RETURN     all  --  10.137.2.26          10.137.2.26
RETURN udp -- 10.137.2.26 224.0.0.251 udp dpt:mdns RETURN udp -- 10.137.2.26 after launching it I can 224.0.0.251 udp dpt:mdns RETURN udp -- 10.137.2.26 239.255.255.250 udp dpt:ssdp RETURN udp -- 10.137.2.26 239.255.255.250 udp dpt:ssdp
RETURN     all  --  anywhere             base-address.mcast.net/4
RETURN     all  --  10.137.2.26          base-address.mcast.net/4
RETURN     all  --  anywhere             255.255.255.255
RETURN     all  --  10.137.2.26          255.255.255.255
RETURN     all  --  172.21.2.13          aaaaa.de/24
RETURN     all  --  isys-team.de/24      172.21.2.13
RETURN     all  --  172.21.2.13          192.168.3.0/24
RETURN     all  --  192.168.3.0/24       172.21.2.13
RETURN     all  --  172.21.2.13          10.5.48.0/24
RETURN     all  --  10.5.48.0/24         172.21.2.13
RETURN     all  --  172.21.2.13          192.168.5.0/24
RETURN     all  --  192.168.5.0/24       172.21.2.13
RETURN     all  --  172.21.2.13          192.168.100.0/24
RETURN     all  --  192.168.100.0/24     172.21.2.13
RETURN     all  --  172.21.2.13          vsrv-dc-3.xxx.yyy.de
RETURN     all  --  vsrv-dc-3.xxx.yyy.de   172.21.2.13
RETURN     all  --  172.21.2.13          vsrv-dc-2.xxx.yyy.de
RETURN     all  --  vsrv-dc-2.xxx.yyy.de   172.21.2.13
RETURN udp -- 172.21.2.13 anywhere udp dpt:domain RETURN udp -- anywhere 172.21.2.13 udp spt:domain
RETURN     all  --  anywhere             255.255.255.255
RETURN     all  --  172.21.2.13          255.255.255.255
DROP       all  --  anywhere             anywhere
DROP       all  --  anywhere             anywhere

Chain ciscovpnfw (3 references)
target     prot opt source               destination


First, I surmise that 10.137.2.26 is the proxyVM address, not appVM.

Its hard to see the problem clearly because of the complexity of what its adding, but I think your appVM packets are probably hitting the 2 DROP targets at the end of 'ciscovpn' chain. This may be because the chain explicitly allows packets from 'source' address of your VPN proxyVM, but there is nothing explicitly in that chain allowing 'source' addresses for downstream appVMs. This is a problem when 'ciscovpn' chain is called from the FORWARD chain.

As a test remedy you could try the following in the proxyVM (_after_ your appVM is already running):

$ sudo iptables -I FORWARD -i vif+ -j ACCEPT

...then try connections from the appVM.

This will cause anything coming from downstream VMs to be accepted for forwarding (which is OK if you don't intend to use Qubes firewall restrictions in appVM Settings). A full long-term solution would involve reconciling the cisco firewall commands with the Qubes firewall service (would be ideal if Anyconnect used a firewall script and it could be located in the system, then you could have the right commands issued from /rw/config/qubes-firewall-user-script).


I have already tried to use the openconnect plugin for network manager, but when I click on Add in the network manager and choose VPN and then "Cisco AnyConnect Compatible VPN (openconnect)" I get a new windows but can't add any information here as every field looks disabled :-/ ?
Working with OpenConnect would be great.

There is also a GUI part that needs to be installed: NetworkManager-openconnect-gnome in Fedora.

I also thought that is Qubes Best practise to use a dedicated VPN Proxy VM vs. launching VPN from within an AppVM ?


Should be OK for a work-only VPN where your appVM is also work-only; Its a different threat model than an Internet-focused VPN.

-

Finally, I should mention leak prevention measures. If you are able to get the VPN to function with proxyVM + appVMs, you can then add these commands in proxyVM to prevent appVMs from having non-VPN access:

iptables -I FORWARD -o eth0 -j DROP
iptables -I FORWARD -i eth0 -j DROP

These need to show up at the _top_ of the FORWARD chain, which is why '-I' insert is used; You can ensure they'll be at the top by executing them last after a connection is made (probably from /rw/config/qubes-firewall-user-script).

--

Chris Laprise, tas...@posteo.net
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ba46841a-0dd1-b974-af7b-257fdb638c5e%40posteo.net.
For more options, visit https://groups.google.com/d/optout.

Reply via email to