-
Notifications
You must be signed in to change notification settings - Fork 26
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
WireGuard DNS is not propagated to reliant VMs #36
Comments
@Ranguvar Hi... What is your template OS version and source for installing wireguard? The state of resolv.conf sounds OK bc qubes-vpn-support doesn't attempt to alter the local DNS for the vpn vm. The place to check DNS is the PR-QBS chain: |
Thanks tasket! Template is Fedora 29, I simply copied it to a new 'wireguard' template, enabled jdoss/wireguard, and installed wireguard-tools and wireguard-dkms. I used Syff's solution in issue 2844 to mount an overlay on top of the kernel modules where wireguard.ko is now stored: QubesOS/qubes-issues#2844 (comment) This overlay is mounted in rc.local before the rest of the vpn-support script is run. Output of Output on personal VM, using sys-vpn as network provider: |
If 128.31.0.72 and 172.98.193.42 are the vpn's dns addresses, then that looks workable. However, it seems like the revision of qubes-vpn-support may be older as the current version sets up dnat in a slightly better way ('anywhere' would replace 10.139.1.2 in the new version, making the fallback server a catch-all). Also, I'm currently not able to test wg connections as I currently don't subscribe to a vpn that offers wg. Unfortunately, that situation is compounded by a recent inability to boot templates or standalone vms using the internal kernel, which is the method I've used so far. A few points for exploration:
|
I've gone ahead and used a mullvad trial account to test, and it works. I'm still using Debian 9 to test, but had to upgrade the template kernel to 4.19. I've updated my wg wiki page to reflect this. |
Hey, sorry I haven't had a chance to test. I'd like to get this working with the PVH Qube I have right now, and I'll see if I can. It looks like the injected DNS functions are ending up below some much larger DNS functions which are taking precedence. I'm traveling and will be able to test this weekend or next week. |
I'm also having the problem that DNS is not propagated to client VMs. Testing DNS inside the VPN VM yields the expected results but in the client VMs I see my ISP's DNS instead of the VPN providers DNS. I am currently using Azire VPN. @tasket regarding your suggestions:
Other notes:
|
Hey tasket!
I've had this working in the past without mucking about, so I've likely fscked something this install, pardon.
I have working WireGuard VPN, reliant VMs can ping out to IPs, but cannot name resolve.
sys-vpn is the name of the VM running qubes-vpn-support with WireGuard, and it has provides_network - True.
/etc/resolv.conf points to the defaults, rather than sys-vpn, my WireGuard ProxyVM, which points to the DNS entry in the WireGuard conf file, and has working resolution.
Any help debugging this would be most appreciated.
The text was updated successfully, but these errors were encountered: