Documentation to expose a port externally is unreliable #9680
Labels
affects-4.2
This issue affects Qubes OS 4.2.
C: doc
P: default
Priority: default. Default priority for new issues, to be replaced given sufficient information.
T: bug
Type: bug report. A problem or defect resulting in unintended behavior in something that exists.
Qubes OS release
For Qubes documentation, I'm on R4.2.3
Brief summary
Qubes doesn't have a good way to expose a port from a qube down the chain to the external interface of sys-net using only firewall rules (NFTables).
Issues with the current method:
Wouldn't it be better if opening a single tcp port to other qube was documented as the preferred way of exposing a port?
Sure, pure nftables avoids Qrexec and socat or systemd sockets, but it seems like provided nftables rules as the preferred way to expose a port to the external interface a hackers note of the possibilities rather than being actually a good implementation.
Could be argued that qubes without Qrexec but network connected will not work using this method.
Without native qubes implementation with qube features and network-hooks in the Qubes codebase, wouldn't it be better if the documentation warned about the problems of the current implementation and suggested using Qrexec when available until Qubes supports exposing a port natively?
The situation is that everybody tries to script it:
But it is still not reliable for most of the error cases, it can only update to the new internal IP on demand (manual or Qubes Events possibly), but the rest of the issues are not solved.
Steps to reproduce
Expected behavior
Connection keeps working.
Actual behavior
Connection stops working, firewall rules are not present or outdated.
@DemiMarie has commented on Matrix:
I replied:
The text was updated successfully, but these errors were encountered: