Did I use the right command?
`sudo iptables -t nat -A PR-QBS -p tcp --dport 53 -j DNAT --to-destination
10.137.0.50` (repeat for udp)

Apparently DNS requests reach the DNS qube, but the response gets stuck
somewhere midway...

On Thu, Jun 8, 2023 at 8:58 AM unman <un...@thirdeyesecurity.org> wrote:

> On Tue, Jun 06, 2023 at 01:24:18PM -0500, Leo28C wrote:
> > I managed to set up a pi-hole qube and make it my network's DNS
> > filtering/caching server. Ironically, it works flawlessly across my
> network
> > EXCEPT it completely breaks DNS for all other qubes in the same system.
> On
> > Debian-based qubes I figured out I can simply edit /etc/resolv.conf,
> while
> > making sure sys-firewall lets the two qubes talk to each other, as a
> > workaround. However this is a hacky per-qube solution and doesn't persist
> > across qube restarts. It would be nice to simply have sys-firewall relay
> > the information to all of its client qubes automatically. Any idea how to
> > do this?
> >
> > Thanks in advance!
> >
> You dont need to change the settings per qube at all.
> You haven't said *where* the pi-hole qube is located in your qubes
> network, or what the nature of the breakage is.
> I assume from what you say it is attached to sys-firewall.
>
> You can do this by editing the PR-QBS chain in nat table in
> sys-firewall.
> By default, this forwards all DNS traffic to 10.139.1.1 and 10.139.1.2
> using dnat. Flush that chain and replace it with dnat rules to the IP
> address of your Pi-hole qube.
> You could do this in /rw/config/qubes-firewall-user-script or by script
> in /rw/config/qubes-firewall.d
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAALhvVaAFaB0umupS40-hGuCP4kzUachFKS0c3fieHo9S6Gfuw%40mail.gmail.com.

Reply via email to