Libvirt hook for setting up iptables port-forwarding rules when using NAT-ed networking.

saschpe saschpe Last update: Mar 24, 2024

image

Libvirt port-forwarding hook

Libvirt hook for setting up iptables port-forwarding rules when using NAT-ed networking.

Installation

To install the hook script and it's configuration files, simply use the Makefile:

Restart your libvirt daemon after installing:

Afterwards, customize /etc/libvirt/hooks/hooks.json to your needs. The file includes documentation on how to set up the port forwards, but changes to the file will be reflected only when the guest VM stops and starts again.

The Makefile target can be invoked multiple times, already installed configuration files won't be touched. The files can be removed again with:

Testing

To run unit tests use the test target of the Makefile:

Or use the Python unittest module to discover tests directly:

Networking

This section describes the theory behind the generated iptables statements.

Packets arriving on the public interface are DNATed to the virtual machine. This implements the actual port-forwarding. Due to the way iptables is implemented, the DNAT must occur in two chains: nat:PREROUTING for packets arriving on the public interface, and nat:OUTPUT for packets originating on the host.

We also add rules to the FORWARD chain to ensure the responses return.

Finally, packets originating on the guest and sent to the host's public IP address need special handling. They are DNATed back to the guest like all other packets but, because the destination is now the same as the source, the reply never leaves the guest. Therefore, the host SNATs these packets to ensure the reply returns over the bridge.

To see a real-world example, the test_setup function in test_qemu.py demonstrates a simple JSON configuration and the iptables rules that it produces.

Authors

  • Sascha Peilicke
  • Scott Bronson

Subscribe to our newsletter