Following up on some of these github discussions. restricting network access by default for disposable qube · Issue #8942 · QubesOS/qubes-issues · GitHub
I am interested in the following statement from the response
“except to save you a few minutes”
What configuration takes a few minutes to prevent anything on a local network communicating with a vm or vice versa?
As a new user I was under the impression that local network was already locked down and isolated (meaning devices on the same network can’t talk or compromise my qubes or qubes services). However, it appears to not be the case. If you could please identify what the contributor is talking about here and let users know what that solution is and how to implement it.
Assuming 4.2 and nft tables.
- How do you eliminate the threat of an external Lan device compromising your qubes VM’s or network qubes and vice versa. E.g., unsecure IoT devices, network printers, chromecast, smart home thing with 0 security etc.
- possible to do the above with firewall cli?
Example response I am hoping for:
From Dom0:
BLOCK INBOUND LAN COMMUNICATIONS TO external devices ON THE SAME LAN communicating with VM
$qvm-firewall <templatevmname> foo bar
^disabling all lan communications
THEN BLOCK OUTBOUND LAN COMMUNICATIONS TO EXTERNAL DEVICES ON THE SAME LAN. Use case: if a vm is already compromised (parrot os qube running hack the box ctf and pentesting etc).
If this involves identifying something e.g., you need to find this subnet <ip address, etc> would you also provide that information and how to correctly obtain it? I.e.,
Connect to wifi or ethernet
Run terminal command in Fedora/debian qube
[user@sys-net ~]$ ip a
Identify this number to obtain etc for firewall rule
Who this helps:
-users who donot set up vlans (on router pihole or otherwise)
-users who donot control the router they may connect to (friends house who loves “smart” things, coffee shop, hotel wifi, bed and breakfast etc)
-users who rarely ever need to use their lan for anything
-users with hacker roommates etc
The only drawbacks I can think of are you will eliminate your ability to print from that qube(s) (which you can’t do out of the box anyway https://github.com/QubesOS/qubes-core-agent-linux/pull/364 ) and you will eliminate your ability to change your routers settings(e.g., by connecting via an Ethernet cable you still wont be able to configure your router or login etc).