-
-
Notifications
You must be signed in to change notification settings - Fork 53
Open
Labels
C: WhonixThis issue pertains to Whonix templates or standalones.This issue pertains to Whonix templates or standalones.C: networkingThis issue pertains to networking in Qubes OS.This issue pertains to networking in Qubes OS.P: defaultPriority: default. Default priority for new issues, to be replaced given sufficient information.Priority: default. Default priority for new issues, to be replaced given sufficient information.community templateThis issue pertains to a community-maintained template.This issue pertains to a community-maintained template.
Description
Qubes OS release
Qubes R4.1
Brief summary
A user using a mobile ISP that provides IPv6 addresses only, reported that Whonix is unable to connect. [1] [2]
[1] https://forums.whonix.org/t/4g-mobile-internet-only-gives-ipv6-address-so-no-internet-route-for-kvm-how-to-solve/19854
[2] While the report is about Non-Qubes-Whonix, the same would happen with Qubes-Whonix.
Steps to reproduce
- Use a IPv6 only ISP.
- Attempt to use Whonix.
Expected behavior
Functional connectivity.
Actual behavior
Broken connectivity.
Discussion.
I am working on adding IPv6 support to Whonix. Some Qubes specific questions...
LOCAL_NET="\
127.0.0.0/24 \
10.137.0.0/16 \
10.138.0.0/16 \
"
WORKSTATION_DEST_SOCKSIFIED="\
10.137.0.0/16 \
10.138.0.0/16 \
10.152.152.10 \
"
Any IPv6 versions?
## DROP PACKETS WITH INCOMING FRAGMENTS. THIS ATTACK ONCE RESULTED IN KERNEL PANICS
#$iptables_cmd -A output -f -j REJECT --reject-with icmp-admin-prohibited
$nftables_cmd add rule inet filter output ip frag-off "&" 0x1fff != 0 counter reject
Useful for IPv6? What would be the equivalent?
if qubes_primary_dns="$(qubesdb-read /qubes-primary-dns 2> /dev/null)"; then
#$iptables_cmd -A output -p udp --dport 53 --dst "$qubes_primary_dns" -j ACCEPT
$nftables_cmd add rule inet filter output ip daddr "$qubes_primary_dns" udp dport 53 counter accept
counter=$((counter + 1))
fi
if qubes_secondary_dns="$(qubesdb-read /qubes-secondary-dns 2> /dev/null)"; then
#$iptables_cmd -A output -p udp --dport 53 --dst "$qubes_secondary_dns" -j ACCEPT
$nftables_cmd add rule inet filter output ip daddr "$qubes_secondary_dns" udp dport 53 counter accept
counter=$((counter + 1))
fi
qubesdb-read /qubes-primary-dns
will remain IPv4 only?
$nftables_cmd add rule inet filter output skuid "$UPDATESPROXYCHECK_USER" ip daddr 10.137.255.254-10.137.255.254 tcp dport "$qubes_updates_proxy_port" counter accept
What range would that be for IPv6?
3nprob
Metadata
Metadata
Assignees
Labels
C: WhonixThis issue pertains to Whonix templates or standalones.This issue pertains to Whonix templates or standalones.C: networkingThis issue pertains to networking in Qubes OS.This issue pertains to networking in Qubes OS.P: defaultPriority: default. Default priority for new issues, to be replaced given sufficient information.Priority: default. Default priority for new issues, to be replaced given sufficient information.community templateThis issue pertains to a community-maintained template.This issue pertains to a community-maintained template.