Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upUsable error message: qvm-move-to-vm and qvm-copy-to-vm target dom0 #2031
Comments
andrewdavidwong
added
enhancement
C: core
P: minor
UX
labels
May 25, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
jpouellet
Nov 15, 2016
Contributor
This happens because dom0 has a policy for qubes.Filecopy:
[user@dom0 ~]$ cat /etc/qubes-rpc/policy/qubes.Filecopy
## Note that policy parsing stops at the first match,
## so adding anything below "$anyvm $anyvm action" line will have no effect
## Please use a single # to start your custom comments
$anyvm $anyvm ask
but no actual RPC service (no /etc/qubes-rpc/qubes.Filecopy).
When a VM tries to invoke qubes.Filecopy on dom0, qrexec-policy is consulted as normal:
[user@dom0 bin]$ sudo /usr/local/bin/execsnoop
Tracing exec()s. Ctrl-C to end.
Instrumenting sys_execve
PID PPID ARGS
...
9318 8939 qrexec-policy -- 7 qubes-builder dom0 qubes.Filecopy SOCKET8
9319 9318 qrexec-policy-9319 [003] d... 10555.510076: execsnoop_sys_execve: (SyS_execve+0x0/0x50)
9320 9319 /sbin/ldconfig -p
You get a dialog asking to confirm. And if you do, then it tries to run the service:
9318 0 qrexec-client -d dom0 -c SOCKET8,qubes-builder,7 /usr/lib/qubes/qubes-rpc-multiplexer qubes.Filecopy qubes-builder
9323 9318 bash -c /usr/lib/qubes/qubes-rpc-multiplexer qubes.Filecopy qubes-builder
9325 9323 mkfifo /tmp/qrexec-rpc-stderr.9323
9326 9323 logger -t qubes.Filecopy-qubes-builder -f /tmp/qrexec-rpc-stderr.9323
9327 9323 rm -f /tmp/qrexec-rpc-stderr.9323
9323 0 /bin/sh -- /etc/qubes-rpc/qubes.Filecopy
but no such service exists.
One possible solution is to just add:
$anyvm dom0 deny
to the top of the policy.
Thoughts?
|
This happens because dom0 has a policy for qubes.Filecopy:
but no actual RPC service (no When a VM tries to invoke qubes.Filecopy on dom0, qrexec-policy is consulted as normal:
You get a dialog asking to confirm. And if you do, then it tries to run the service:
but no such service exists. One possible solution is to just add:
to the top of the policy. Thoughts? |
added a commit
to jpouellet/qubes-core-admin
that referenced
this issue
Nov 15, 2016
jpouellet
referenced this issue
in QubesOS/qubes-core-admin
Nov 15, 2016
Closed
Explicitly deny qubes.Filecopy to dom0 in RPC policy #70
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Nov 15, 2016
Member
I think the bug is elsewhere: documentation says dom0 reserved keywords (note string dom0 does not match the $anyvm pattern; all other names do). Apparently this is broken...
|
I think the bug is elsewhere: documentation says |
marmarek
closed this
in
marmarek/qubes-core-admin-linux@981a11c
Nov 18, 2016
added a commit
to marmarek/qubes-core-admin
that referenced
this issue
Nov 18, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Nov 18, 2016
Member
Automated announcement from builder-github
The package qubes-core-dom0-linux-3.2.10-1.fc23 has been pushed to the r3.2 testing repository for dom0.
To test this update, please install it with the following command:
sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing
|
Automated announcement from builder-github The package
|
marmarek
added
the
r3.2-dom0-cur-test
label
Nov 18, 2016
added a commit
to QubesOS/qubes-core-admin
that referenced
this issue
Nov 20, 2016
added a commit
to QubesOS/qubes-core-admin-linux
that referenced
this issue
Nov 20, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Nov 20, 2016
Member
Automated announcement from builder-github
The package qubes-core-dom0-linux-3.1.13-1.fc20 has been pushed to the r3.1 testing repository for dom0.
To test this update, please install it with the following command:
sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing
|
Automated announcement from builder-github The package
|
marmarek
added
the
r3.1-dom0-cur-test
label
Nov 20, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Dec 4, 2016
Member
Automated announcement from builder-github
The package qubes-core-dom0-linux-3.1.13-1.fc20 has been pushed to the r3.1 stable repository for dom0.
To install this update, please use the standard update command:
sudo qubes-dom0-update
Or update dom0 via Qubes Manager.
|
Automated announcement from builder-github The package
Or update dom0 via Qubes Manager. |
marmarek
added
r3.1-dom0-stable
and removed
r3.1-dom0-cur-test
labels
Dec 4, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
qubesos-bot
Jan 8, 2017
Automated announcement from builder-github
The package qubes-core-dom0-linux-3.2.11-1.fc23 has been pushed to the r3.2 stable repository for dom0.
To install this update, please use the standard update command:
sudo qubes-dom0-update
Or update dom0 via Qubes Manager.
qubesos-bot
commented
Jan 8, 2017
|
Automated announcement from builder-github The package
Or update dom0 via Qubes Manager. |
Jeeppler commentedMay 25, 2016
•
edited
Edited 1 time
-
Jeeppler
edited May 25, 2016 (most recent)
Qubes OS version (e.g.,
R3.1):R3.1
Affected TemplateVMs (e.g.,
fedora-23, if applicable):all
Expected behavior:
Expect an error message like:
or
each with useful qrexec error dialog message.
Actual behavior:
No, useful error message: