Any reason not to use qvm-connect-tcp for ouside port forwarding?

Hello Everyone,

The instructions for port forwarding from the outside world to a qube are, involved: Firewall | Qubes OS

They are so involved, many people have written scripts to help facilitate (lol anyone have one for qubes 4.2 nfttables yet?)

However, right above the instructions in the same documentation, is a much simpler solution, qube to qube tunneling built into qubes-os. Why not use it? For example, lets say I want to forward port 443 from the qube work to the outside world:

In dom0 /etc/qubes/policy.d/30-user-networking-policy:

qubes.ConnectTCP +443 sys-net @default allow target=work

Now on sys-net do the following (note I’m using Qubes 4.2, so nfttables, not iptables):

sudo su
echo 'qvm-connect-tcp 443:@default:443` >> /rw/config/rc.local
echo 'nft add rule ip qubes input tcp dport 443 accept' >> /rw/config/rc.local
qvm-connect-tcp 443:@default:443
nft add rule ip qubes input tcp dport 443 accept 
exit

I tried this and it works. It’s much simpler, add a single line policy on dom0 and two lines to a rc.local on sys.net. Any reason to do the manual configuration on sys-net, sys-firewall, and work as documented by qubes-os?

2 Likes

Well, after using this tunnel I think I can answer my own question.

I think this is fine and much simpler to configure.

Pros:
Easy to Configure

Cons:
qvm-connect-tcp run’s socat under the hood to facilitate a tunnel. Configuring all the firewall rules on all three qubes is more efficient as there is no process facilitating a tunnel.

For my use case, personally accessing services I’m developing to test from my LAN, the extra resources are negligible.

2 Likes

Since you’re giving not only detailed instructions to reproduce your use of qvm-connect-tcp, but also a summary of the trade-off involved, I think it’s more than fair to mark your second post as the solution of the thread @face!

I’m not sure you can mark your own post as a solution, so I did it to make easier for folks with the same question to see there in an answer to it. Feel free to correct if needed as you see fit! (I’m pretty sure you can do that.)

Thank you for taking the time to document the solution you found!

@unman Since there is a question about the docs, and a suggestion for simpler instructions, I suppose you may be interested in this thread.

(I am not familiar enough with the topic to emit an opinion on the alternative, but I suppose you would.)

Thank you @face for this great tipp! I’m on Qubes 4.2 too and this is so much more convenient than figuring out the involved port forwarding described in the docs.

Performance, which is the disadvantage of this simple method, seems pretty decent for my simple use case of syncing large files with syncthing. I get ~40MB/s on a Gigabit network with the host being a i7-7820HQ serving from a HDD.

1 Like

Hi @doublehelix , can you answer me in pm? I have questions about syncthing setup. Thanks.

This sounds great. I’m hosting a local webserver that will launch an app for my partner to use. Id need to forward 1194 since it’s over openvpn that the external machine is connecting. Or I could just have external machine connect to my router then restrict by mac and port 443 for his machine once he’s on my network. What do you think is best approach?