Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upMake it easier to install new qrexec policy #1706
Comments
marmarek
added
enhancement
C: core
P: major
release-notes
labels
Jan 29, 2016
marmarek
added this to the Release 3.1 milestone
Jan 29, 2016
marmarek
modified the milestones:
Release 3.1,
Release 3.1 updates
Feb 8, 2016
andrewdavidwong
added
the
UX
label
May 31, 2016
added a commit
that referenced
this issue
May 31, 2016
unman
referenced this issue
in QubesOS/qubes-core-admin-linux
Apr 20, 2017
Merged
Prompt to create policy file for qubes-rpc if not present. #24
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
Show comment
Hide comment
|
@andrewdavidwong Close please |
andrewdavidwong
closed this
Apr 25, 2017
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
marmarek commentedJan 29, 2016
Currently when one want to install some VM-VM qrexec service, he/she still needs to create at least one file in dom0: qrexec policy. If there is no such policy, service call will be denied (after a message that policy is missing).
It may be good idea to ask in such a case whether some default policy should be created (default: ask for every call). Such question should be hard to accept by default - at least having "No" as default, but better having non-standard action (like "draw a cat here" ;) ).
This should ease implementing new qrexec services.
@bnvk any idea for such hard to accept by mistake window?