Re: [qubes-users] XL VM connectivity to Qubes Network

2018-10-10 Thread 3mptyy
> I believe that is indeed the aim.
> You can either set to 255.255.255.0 or add specific route, as you have
> done. (Did you set a return route on the destination also?)

The return route is automatically added to the Proxy with the vif-route-qubes, 
and the destination send all traffic to the proxy. The vif-route-qubes seems to 
work perfectly, I noticed no difference between a Qube and a HVM using the 
script...

> The next step would be to examine the rules on the proxy to make sure
> that you are allowing the traffic through the ProxyVM. You could listen
> on the interface that's attached to 10.137.0.8 to see if traffic is
> outbound from there.
> 
> unman

I removed all firewall rules (from Proxy and Qube Server), here's the conf :

# iptables -L

Chain INPUT (policy ACCEPT)
target prot opt source   destination

Chain FORWARD (policy ACCEPT)
target prot opt source   destination

Chain OUTPUT (policy ACCEPT)
target prot opt source   destination

Chain QBS-FORWARD (0 references)
target prot opt source   destination

# iptables -t raw --list

Chain PREROUTING (policy ACCEPT)
target prot opt source   destination

Chain OUTPUT (policy ACCEPT)
target prot opt source   destination

Always the same result, Qube client connects to Qube server perfectly, HVM 
doesn't connect to Qube server.

I captured traffic this afternoon and I think it's an ARP problem... Here's a 
working ARP session when I connect from Qube client to Qube Server :

QUBE CLIENT ARP (from its specific vif) :

18:32:09.483319 ARP, Request who-has 10.137.0.12 tell 10.137.0.10, length 28
18:32:09.483502 ARP, Reply 10.137.0.12 is-at 00:16:3e:5e:6c:00, length 28
18:32:09.746948 ARP, Request who-has 10.137.0.10 tell 10.137.0.12, length 28
18:32:09.746970 ARP, Reply 10.137.0.10 is-at fe:ff:ff:ff:ff:ff, length 28

QUBE SERVER ARP (from its specific vif) :

18:32:09.483343 ARP, Request who-has 10.137.0.8 tell 10.137.0.10, length 28
18:32:09.483536 ARP, Reply 10.137.0.8 is-at 00:16:3e:5e:6c:00, length 28
18:32:09.542795 ARP, Request who-has 10.137.0.10 tell 10.137.0.8, length 28
18:32:09.542817 ARP, Reply 10.137.0.10 is-at fe:ff:ff:ff:ff:ff, length 28

--

and here is the ARP session from HVM to Qube Server :

HVM ARP :

18:33:34.793593 ARP, Request who-has 10.137.0.10 tell 10.137.0.200, length 28
18:33:34.793631 ARP, Reply 10.137.0.10 is-at fe:ff:ff:ff:ff:ff, length 28

18:34:06.537570 ARP, Request who-has 10.137.0.10 tell 10.137.0.200, length 28
18:34:06.537609 ARP, Reply 10.137.0.10 is-at fe:ff:ff:ff:ff:ff, length 28

18:34:38.793679 ARP, Request who-has 10.137.0.10 tell 10.137.0.200, length 28
18:34:38.793699 ARP, Reply 10.137.0.10 is-at fe:ff:ff:ff:ff:ff, length 28

QUBE SERVER ARP :

Nothing :(

--

It's like the Proxy does not forward traffic to the destination vif, but 
there's no firewall rule blocking it, so I'm out of ideas...

Other observations : ping is working between HVM and Proxy. No luck between HVM 
and Qube Server. 

I saw that every Qube had the same MAC address (I don't understand how it's 
possible, I'd really appreciate a document explaining how Qubes Networking 
work...) so I tried to set this same MAC address to the HVM, no more luck.

Any help appreciated ! I'm feeling desperate right now :(

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/133d75e3-bebf-49dd-ac0f-90c3ec680fb1%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] XL VM connectivity to Qubes Network

2018-10-08 Thread unman
On Mon, Oct 08, 2018 at 03:27:43AM -0700, 3mp...@gmail.com wrote:
> On Tuesday, September 25, 2018 at 9:24:08 PM UTC+2, 3mp...@gmail.com wrote:
> > > Some obvious questions.
> > > 
> > > You say the interface is correctly configured.
> > > Do you have any routes set in the Windows box?
> > > Do you see traffic outbound on the 10.137.0.50 iface?
> > > 
> > > If you sniff traffic inbound on the vif attached to the Windows HVM, do
> > > you see anything there? (I mean sniff on the proxyVM)
> > 
> > Hi Unman, thanks for your help.
> > 
> > To eliminate some potential Windows issues I chose to boot on a fedora 28 
> > live cd in this HVM.
> > 
> > I configured the eth0 interface with the following command to copy a normal 
> > qubes configuration :
> > 
> > ifconfig eth0 10.137.0.200 (HVM IP) netmask 255.255.255.255 broadcast 
> > 10.255.255.255
> > route add -host 10.137.0.10 (ProxyVM IP) dev eth0
> > route add default gw 10.137.0.10 eth0
> > 
> > I identified vif14 on ProxyVM, it corresponds to the HVM interace.
> > 
> > I launched tcpdump -n -i vif14.0 on ProxyVM, telnet from 10.137.0.200 (HVM) 
> > to 10.137.0.8 port 8080 (web server on qube I'm trying to reach, working 
> > great from a third qube)
> > 
> > telnet doesn't connect but here's the result of tcpdump :
> > 
> > https://pastebin.com/QXhyBx4Z
> > 
> > Any help appreciated
> 
> Could someone help me on this issue ? Or explain the right network 
> configuration in Qubes 4.0 ? The 255.255.255.255 netmask seems strange to 
> me... Is the idea to block all kind of traffic except to the gateway with the 
> route add -host commmand ?
> 

I believe that is indeed the aim.
You can either set to 255.255.255.0 or add specific route, as you have
done. (Did you set a return route on the destination also?)

The next step would be to examine the rules on the proxy to make sure
that you are allowing the traffic through the ProxyVM. You could listen
on the interface that's attached to 10.137.0.8 to see if traffic is
outbound from there.

unman

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20181008135548.g4wsss6ld25qfvg3%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] XL VM connectivity to Qubes Network

2018-10-08 Thread 3mptyy
On Tuesday, September 25, 2018 at 9:24:08 PM UTC+2, 3mp...@gmail.com wrote:
> > Some obvious questions.
> > 
> > You say the interface is correctly configured.
> > Do you have any routes set in the Windows box?
> > Do you see traffic outbound on the 10.137.0.50 iface?
> > 
> > If you sniff traffic inbound on the vif attached to the Windows HVM, do
> > you see anything there? (I mean sniff on the proxyVM)
> 
> Hi Unman, thanks for your help.
> 
> To eliminate some potential Windows issues I chose to boot on a fedora 28 
> live cd in this HVM.
> 
> I configured the eth0 interface with the following command to copy a normal 
> qubes configuration :
> 
> ifconfig eth0 10.137.0.200 (HVM IP) netmask 255.255.255.255 broadcast 
> 10.255.255.255
> route add -host 10.137.0.10 (ProxyVM IP) dev eth0
> route add default gw 10.137.0.10 eth0
> 
> I identified vif14 on ProxyVM, it corresponds to the HVM interace.
> 
> I launched tcpdump -n -i vif14.0 on ProxyVM, telnet from 10.137.0.200 (HVM) 
> to 10.137.0.8 port 8080 (web server on qube I'm trying to reach, working 
> great from a third qube)
> 
> telnet doesn't connect but here's the result of tcpdump :
> 
> https://pastebin.com/QXhyBx4Z
> 
> Any help appreciated

Could someone help me on this issue ? Or explain the right network 
configuration in Qubes 4.0 ? The 255.255.255.255 netmask seems strange to me... 
Is the idea to block all kind of traffic except to the gateway with the route 
add -host commmand ?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9724addd-d087-4f64-ab60-32ce5b7a9437%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] XL VM connectivity to Qubes Network

2018-09-25 Thread 3mptyy
> Some obvious questions.
> 
> You say the interface is correctly configured.
> Do you have any routes set in the Windows box?
> Do you see traffic outbound on the 10.137.0.50 iface?
> 
> If you sniff traffic inbound on the vif attached to the Windows HVM, do
> you see anything there? (I mean sniff on the proxyVM)

Hi Unman, thanks for your help.

To eliminate some potential Windows issues I chose to boot on a fedora 28 live 
cd in this HVM.

I configured the eth0 interface with the following command to copy a normal 
qubes configuration :

ifconfig eth0 10.137.0.200 (HVM IP) netmask 255.255.255.255 broadcast 
10.255.255.255
route add -host 10.137.0.10 (ProxyVM IP) dev eth0
route add default gw 10.137.0.10 eth0

I identified vif14 on ProxyVM, it corresponds to the HVM interace.

I launched tcpdump -n -i vif14.0 on ProxyVM, telnet from 10.137.0.200 (HVM) to 
10.137.0.8 port 8080 (web server on qube I'm trying to reach, working great 
from a third qube)

telnet doesn't connect but here's the result of tcpdump :

https://pastebin.com/QXhyBx4Z

Any help appreciated

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/83b2b37d-ea44-41a4-a2f1-1de7c6097005%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] XL VM connectivity to Qubes Network

2018-09-24 Thread unman
On Mon, Sep 24, 2018 at 05:40:16AM -0700, 3mp...@gmail.com wrote:
> Hi,
> 
> I’m still working on my Qubes 4.0 migration and I’m trying to connect a 
> Windows 10 XL created VM to Qubes Networking by adding this kind of line in 
> the hvm file :
> 
> vif = [ 'mac=00:16:3e:5e:6d:11,model=e1000,
> ip=10.137.0.50,script=vif-route-qubes,backend=sys-vpn’ ]
> 
> The backend is a functional proxy VM created by following the « Set up a 
> ProxyVM as a VPN gateway using iptables and CLI scripts » tutorial
> 
> The guest VM is a Windows 10 1804 with Xen paravirtual drivers 8.2.1 
> installed. The e1000 is correctly detected as a Xen adapter with link up and 
> configured with IP : 10.137.0.50 / 24, no gateway, I’m just trying to access 
> some HTTP services in another qube connected to the same proxyVM. Firewall 
> rules are OK because it’s working from a third qube connected to the proxyVM.
> 
> The Windows 10 VM is acting like it has no connectivy at all. Can’t connect 
> to the HTTP server of my qube. I tried removing all firewall rules in proxyVM 
> and qube HTTP server and setting ACCEPT policy for all chains, it doesn’t 
> change anything so I think it’s not a firewall problem…
> 
> I’d be grateful if someone gives me a clue where the problem could be :(
> 
Some obvious questions.

You say the interface is correctly configured.
Do you have any routes set in the Windows box?
Do you see traffic outbound on the 10.137.0.50 iface?

If you sniff traffic inbound on the vif attached to the Windows HVM, do
you see anything there? (I mean sniff on the proxyVM)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20180924161650.plreluuan47fbf3w%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.