qubes-doc/en/configuration/network-bridge-support.md

146 lines
5.4 KiB
Markdown
Raw Normal View History

2013-08-09 12:37:47 +00:00
---
2015-04-10 20:17:45 +00:00
layout: doc
title: Network Bridge Support
permalink: /en/doc/network-bridge-support/
redirect_from:
- /doc/NetworkBridgeSupport/
- /wiki/NetworkBridgeSupport/
2013-08-09 12:37:47 +00:00
---
Network Bridge Support (EXPERIMENTAL and UNSUPPORTED)
=====================================================
The Qubes developpement team does not support bridging the network interfaces found in NetVM and don't plan to support it at all. Several reasons for that:
- Using a bridged VM is almost only necessary for developpers testing or working on OSI layer 2 or layer 3 tools (MAC or routing protocols). If not for testing, such tools are almost only used directly on routers ...).
- Most of these tools can be anyway used directly inside the NetVM, which has direct access to the network card.
- It is also possible to use a secondary network card plugged into a specific development VM.
- Such a setup could break security features of Qubes such as AppVM firewalling.
Now if you really want to work with OSI layer2 / layer 3 tools, that you don't have a secondary network card, or that you want to completely expose services of a given AppVM (at your own risk), a bridged setup may help you.
2013-08-09 15:30:14 +00:00
Qubes manager patch (Qubes R2B2)
2013-08-09 12:37:47 +00:00
--------------------------------
The following patches can be applied to the Qubes Manager GUI in order to add an option to easily bridge a VM. Use it at your own risk. If the patch breaks the Qubes Manager, you can try to restore the qubes packages:
~~~
2013-08-09 12:40:00 +00:00
# qubes-dom-update qubes-core-dom0 qubes-manager
# yum reinstall qubes-core-dom0
# yum reinstall qubes-manager
~~~
2013-08-09 12:53:13 +00:00
2013-08-09 13:14:23 +00:00
First, retrieve the attachment of this Wifi article in dom0. Then apply the three patches the following way after installing the patch tool :
2013-08-09 12:53:13 +00:00
~~~
2013-08-09 13:14:23 +00:00
# qubes-dom0-update patch
2013-08-09 12:53:13 +00:00
# patch /usr/lib64/python2.7/site-package/qubes/qubes.py < qubes.py-bridge.diff
# patch /usr/lib64/python2.7/site-package/qubesmanager/settings.py < settings.py-bridge.diff
# patch /usr/lib64/python2.7/site-package/qubesmanager/ui_settingsdlg.py < ui_settingsdlg.py-bridge.diff
~~~
2013-08-09 12:53:13 +00:00
Finally restart the qubes manager GUI.
A new option is now available in the AppVM Settings to enable set the NetVM in bridge mode. For a bridged AppVM, you should the select a netvm instead of a firewall vm, enabled the Bridge option and restart your AppVM.
2013-08-09 15:30:14 +00:00
NetVM patch (Qubes R2B2)
2013-08-09 12:53:13 +00:00
------------------------
2013-08-09 13:14:23 +00:00
You need to modify manually the NetVM iptable script inside the NetVM. The reason is that by default the NetVM only accept traffic coming from network interfaces called vif\* (in our case, we will use an additional interface called bridge0. The second reason is that all trafic is NATed by default. In our case, we want to forward traffic from the bridge interface without modifying it, while NATing traffic coming from vif\* interfaces.
Modify manually the Template you use for your NetVM (not the NetVM itself). This is by default fedora-x86\_64. Edit the file /etc/sysconfig/iptables. You need to modify two parts of the file.
- Starting from the line -A POSTROUTING -j MASQUERADE that you need to comment :
~~~
2013-08-09 13:14:23 +00:00
# Bridge support
# Comment the following line
#-A POSTROUTING -j MASQUERADE
# Ensure packets coming from firewallVMs or AppVMs use NAT
-A POSTROUTING -m iprange --src-range 10.137.1.0-10.137.2.255 -j MASQUERADE
# Allow redirection of bridge packets (optional as POSTROUTING default is ACCEPT)
#-A POSTROUTING -o bridge+ -j ACCEPT
# End Bridge support
~~~
2013-08-09 13:14:23 +00:00
- Starting from the line -A FORWARD -i vif+ -j ACCEPT:
~~~
2013-08-09 13:14:23 +00:00
-A FORWARD -i vif+ -o vif+ -j DROP
-A FORWARD -i vif+ -j ACCEPT
# Bridge Support
-A FORWARD -i bridge+ -j ACCEPT
# End Bridge Support
-A FORWARD -j DROP
~~~
2013-08-09 13:14:23 +00:00
Ensure that the IP addresses used by default in qubes are in the form 10.137.1.\* or 10.137.2.\* by running ifconfig. Of course, this setup won't work with IPv6.
2013-08-09 13:23:53 +00:00
Now you need to restart the NetVM and FirewallVM or only iptables in both VMs if you prefer:
~~~
2013-08-09 13:23:53 +00:00
# systemctl restart iptables
~~~
2013-08-09 13:23:53 +00:00
2013-08-09 15:23:50 +00:00
Create a Bridge inside the NetVM
--------------------------------
A bridge can be created inside the standard network manager (the network icon in the taskbar).
This requires:
- creating a bridge that will be your main IP (ex: setup the bridge with DHCP)
- attach eth0 to your bridge
Note: A wireless interface cannot be bridged.
The bridge edition GUI is somehow buggy as it does not remember all the parameter you setup. You can fix it by editing manually the files in /etc/NetworkManager/system-connections/. Here is one example for these files:
- Bridge-DHCP
~~~
2013-08-09 15:23:50 +00:00
[connection]
id=Bridge-DHCP
uuid=fd68198b-313a-47cb-9155-52e95cdc67f3
type=bridge
autoconnect=false
timestamp=1363938302
[ipv6]
method=auto
[ipv4]
method=auto
[bridge]
interface-name=bridge0
stp=false
~~~
2013-08-09 15:23:50 +00:00
Note: Do not forget to put stp=false if you bridge only eth0 because sending BPDUs could make your admins angry :)
- bridge0-eth0
~~~
2013-08-09 15:23:50 +00:00
[802-3-ethernet]
duplex=full
mac-address=88:AE:1D:AE:30:31
[connection]
id=bridge0-eth0
uuid=38320e5b-226c-409e-9fd6-0fbf4d0460a0
type=802-3-ethernet
autoconnect=false
timestamp=1363601650
master=fd68198b-313a-47cb-9155-52e95cdc67f3
slave-type=bridge
~~~
2013-08-09 15:23:50 +00:00
If you do not manager to start your bridge, you can start it manually from a NetVM terminal:
~~~
2013-08-09 15:23:50 +00:00
$ nmcli con up id bridge0-eth0
~~~
2013-08-09 15:23:50 +00:00
Now that the bridge is ready, the bridged AppVM can be started...