2016-04-10

# Setup NAT Network for QEMU in Mac OSX

I am working on a really cool project where we have to manage virtual machines that are launched through QEMU. The project is meant to run in Linux, but as I (and all my colleagues) have a Mac to develop, we wanted to be able to run the project under Mac. Yes, I know QEMU’s performance on Mac sucks!

We couldn’t use QEMU’s user mode network stack due to its limitations. We needed to use TAP interfaces, the machines should be able to acquire the network configuration through DHCP and should be NATted.

An schema of how I wanted things to be is as follows:

## Enable TAP interfaces in Mac

The first issue I stumbled upon is the fact that Mac does not have native support for TAP interfaces.

In order to have TAP interfaces in Mac we need to download and install TunTap.

Once it is installed, we are going to see a list of TAP nodes installed with the scheme /dev/tapX. TunTap determines the max number of possible TAP interfaces and sets them up.

## Creating the bridge interface

Once we are able to use TAP interfaces, we need to create the bridge where we can attach them.

This is really straight-forward in Mac. For a temporal bridge we just need to issue the following command with elevated privileges:

$sudo ifconfig bridge1 create  The next step is to configure the address for that newly created bridge. Which IP we give it, will depend on the network we want to use for our VM network. As an example, I will use the 192.168.100.0/24 network, so I will assign 192.168.100.1 to the bridge. It will act as the default gateway for all the virtual machines, that is why we need to assign that IP statically. $ sudo ifconfig bridge1 192.168.100.1/24


## Packet forwarding and NAT

The next step to reach our goal is to configure our Mac so that the packets that arrive from the bridge1 interface are routed correctly. We also need to NAT these packets as otherwise they won’t find their way back.

Enabling packet forwarding is really easy, we just need to execute:

$sudo sysctl -w net.inet.ip.forwarding=1  For the NAT we need to create a pfctl configuration file where we state the rule that will do the NAT. In a file we write the following: nat on en0 from bridge1:network to any -> (en0)  This rule tells pfctl to NAT packets that: 1. Go through en0 (you should replace this interface for the one connected to the internet) and 2. Have source IP from the network range associated to bridge1 (here goes the bridge name of our VM network) The address to use for the NAT is indicated after the ->. We need to put the interface connected to the internet between parenthesis. The parenthesis are important because it forces the evaluation of the address associated with the interface each time the rule is applied. If we don’t add it, the address to use will be resolved at load time and if it changes, the used address will be incorrect. Now we need to enable the pfctl with the given rule. $ sudo pfctl -F all # This flushes all active rules

## QEMU and interface setup

The last thing to do is to launch the virtual machines and correctly set up the attached interface so that it is correctly attached to the bridge.

We are going to be using a TAP interface setup in QEMU using a virtio NIC. We cannot use the bridge setup in Mac due to the inexistent qemu-bridge-helper for the platform.

To configure the virtio device we need to use the following command line arguments: -net nic,model=virtio. Here is where we would also specify the MAC address for the interface if we want to.

The command line argument specification to setup the interface as TAP is like this:

-net tap[,vlan=n][,name=name][,fd=h][,ifname=name][,script=file][,downscript=dfile][,helper=helper]


From those arguments we are interested in 2 of them in particular, script and downscript. The files given in those arguments are executed right after the TAP interface is created and right before the TAP interface is destroyed, respectively. We need to use those scripts to attach and detach the interface from the bridge.

The scripts receive one command line argument with the name of the interface involved. We need to create two scripts:

• qemu-ifup.sh will be used as the start script and will attach the interface to the bridge:
#!/bin/bash

ifconfig bridge1 addm $1  • qemu-ifdown.sh will be used in the downscript to detach the interface from the bridge before it is destroyed: #!/bin/bash ifconfig bridge1 deletem$1


All that’s left is start the VMs and enjoy the newly created NAT network.

2016-03-20

# Free SSL: Using "Let's Encrypt" for TLS certificates in your website

When I was setting up this new blog, I wanted to see if there was a way of enabling TLS for it without having to buy a certificate. Let’s face it, this site has nothing confidential nor there is sensitive information like logins that need to be protected, thus having to pay to have a valid SSL protected site did not make any sense.

I started looking if there was any CA that offered free certificates or anything like it. That’s when I came across this interesting project: “Let’s Encrypt”.

Let’s Encrypt is a fully automated, free and open CA that offers certificates in a fully automated way. The generated certificates last for only 90 days. You might be thinking that that sucks, because every 3 months you will have to go through the hassle of renewing the certificates for your sites. The really cool thing about this project is that they provide a client that makes it extremely simple to generate and renew the certificates for your sites, with minimal intervention when generating the certificate and no intervention at all for renewing.

## Setting up TLS in nginx using “Let’s Encrypt”

Here I’m going to show the steps I took in order to setup TLS for this blog in my Ubuntu 14.04 server using Let’s Encrypt and nginx.

I am not going to use the nginx plugin for Let’s Encrypt because, according to their documentation, it is in experimental state and it is not shipped with Let’s Encrypt.

I will be using the webroot plugin. This plugin requires access to the root folder of the site you want to generate the certificate for. The reason behind this is that Let’s Encrypt, in order to validate that the requester actually controls the domain he is asking the certificate for, will require a challenge. One of the challenge methods (the one used by this plugin) is to provide a file in a certain location of the site with a requested random content.

### Installing the Let’s Encrypt client

The best way to install this is by cloning their repo. This also makes it easy to update it.

$sudo git clone https://github.com/letsencrypt/letsencrypt /opt/letsencrypt  Updating is just pulling the latest changes from upstream to our repo. ### Generating the certificate This is the beauty of Let’s Encrypt, the whole process is reduced to a one-liner command. Let’s assume that the site’s root is located on the path /var/www/ and the name is www.mysite.com. All you need to do to generate the certificate is: $ /opt/letsencrypt/letsencrypt-auto certonly --webroot -w /var/www -d www.mysite.com


Want something easier than that? Impossible.

After the process has finished, Let’s Encrypt will have generated a set of PEM files under the directory /etc/letsencrypt/live/www.mysite.com/. Actually, what’s you are going to find in that directory are symlinks to the current certificates for the site. You can find all the certificates that the client has ever generated for the site under /etc/letsencrypt/archive/www.mysite.com/.

If you want to change the default arguments for the certificate generation you can take a look at the different arguments you can pass the Let’s Encrypt client. You can also setup a configuration file with everything you need for a certain certificate generation and give only that to the Let’s Encrypt client.

### Enabling TLS on a site using nginx

This is really straightforward. Just open the nginx’s configuration file for your site and add the following piece inside the server section:

listen 443 ssl;

ssl_certificate /etc/letsencrypt/live/www.mysite.com/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/www.mysite.com/privkey.pem;


That’s it! Reload the server’s configuration and Voila! you have TLS enabled with a valid certificate.

Now, if you want to go for something stronger regarding with security you will need to generate strong Diffie-Hellman parameters and restrict which ciphers you want to use.

To generate the Diffie-Hellman parameters run the following command:

$sudo openssl dhparam -out /etc/ssl/certs/dhparam.pem 2048  And to make nginx use them and restrict the ciphers add the following right after the changes you made to enable TLS in your site’s configuration file: ssl_prefer_server_ciphers on; ssl_dhparam /etc/ssl/certs/dhparam.pem; ssl_ciphers 'ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:AES:CAMELLIA:DES-CBC3-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!aECDH:!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA';  ### Certificate renewal Renewing the certificate is just as easy as generating a new certificate for a site, a single command: $ /opt/letsencrypt/letsencrypt-auto renew


This will renew all the certificates that are managed by Let’s Encrypt that are due for renewal (less than 30 days for expiration).

In any case, having to remember to run the command every 60-90 days is still a pain and prone to forgetting and letting your site with an invalid certificate.

That’s the reason why I think setting up automatic renewal is key. As you can imagine, this is really easy using cron. Open the crontab for the root user: \$ sudo crontab -e and add the following cron jobs:

30 20 * * 6 /opt/letsencrypt/letsencrypt-auto renew >> /var/log/letsencrypt-renew.log
35 20 * * 6 service nginx reload


This will basically execute the renewal process every Saturday at 20:30 and 5 minutes later we reload the nginx configuration.

2016-03-18

# New Blog: past and future

I’ve finally decided to renew my blog. Blogger is quite dead and was pretty uncomfortable to work with. I am not fond of writing CSS nor HTML and I wasn’t able to get the blog to look the way I wanted in an easy manner.

Also, I am quite a control and order freak. Blogger didn’t provide me an easy way to backup the stuff I had there, nor there was a way for me to have revisions of how the blog had been evolving.

One of the worst things that I’ve found with Blogger is how hard it was to write posts that included code highlighting. I had to fall back to the HTML editor and embed a pre tag to make it work. Having to switch back and forth from WYSIWYG editor to the HTML one was a pain, specially in posts where there was a lot of code sections.

So I started looking at what platforms were available to switch over. My objective was to find a platform that was easy to deploy and maintain, that I could keep the content in a git repo and that I could write posts in markdown format. I didn’t actually care whether I would need to host the site myself or use a service. Another thing that I was really looking for was that there was a good amount of layout offerings online simple enough for me to modify to my taste.

After seeing many different options I decided to settle with Jekyll. It really is all I have been looking for. Markdown writing of posts, integrated syntax highlighting and zero dependencies for deployment (it generates a static site).

I also found this cool layout (thanks to Scott Emmons for making it!) which I modified a little bit to give it a personal touch. The most frustrating part was trying to get the “mini-profile” section on the left to look the way I wanted!

You might be wondering what am I gonna do with my previous blog and its content. Well, I am going to migrate the contents and shut it down. I don’t know if I will be able to migrate everything soon enough but eventually I will.

I am hoping I can be more active from now on this blog that what I have been in blogger the last couple of years. I will try to write more often and, hopefully, I will try to explore other topics than programming.