New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow starting only selected AppVMs as DispVM #2075

Closed
marmarek opened this Issue Jun 16, 2016 · 6 comments

Comments

Projects
None yet
3 participants
@marmarek
Member

marmarek commented Jun 16, 2016

Follow up from #866 - allow only selected AppVMs to be started as DispVM. It should be a VM property like dispvm.
The property should affect following things:

  • allow starting a VM as DispVM
  • change private volume type from read-write to origin

It shouldn't be possible to change the property when VM is running or there exists any DispVM based on it.
Related task: after implementing this property, add support for old dispvm_netvm setting to migration tool.

@marmarek marmarek added this to the Release 4.0 milestone Jun 16, 2016

marmarek added a commit to marmarek/old-qubes-core-admin that referenced this issue Jun 16, 2016

marmarek added a commit to marmarek/old-qubes-core-admin that referenced this issue Jun 16, 2016

marmarek added a commit to marmarek/old-qubes-core-admin that referenced this issue Jun 16, 2016

@jpouellet

This comment has been minimized.

Show comment
Hide comment
@jpouellet

jpouellet Feb 28, 2017

Contributor

What is the intended benefit of this?

Contributor

jpouellet commented Feb 28, 2017

What is the intended benefit of this?

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Feb 28, 2017

Member

Avoid mistakes like opening untrusted (or in fact: any) document in DispVM based on some private-data-holding VM (like vault).

Member

marmarek commented Feb 28, 2017

Avoid mistakes like opening untrusted (or in fact: any) document in DispVM based on some private-data-holding VM (like vault).

@andrewdavidwong

This comment has been minimized.

Show comment
Hide comment
@andrewdavidwong

andrewdavidwong Mar 1, 2017

Member

Avoid mistakes like opening untrusted (or in fact: any) document in DispVM based on some private-data-holding VM (like vault).

Accidentally opening a sensitive file in a DispVM is only a problem if the DispVM does not inherit the parent VM's NetVM, firewall rules, and RPC policies. Correct?

Member

andrewdavidwong commented Mar 1, 2017

Avoid mistakes like opening untrusted (or in fact: any) document in DispVM based on some private-data-holding VM (like vault).

Accidentally opening a sensitive file in a DispVM is only a problem if the DispVM does not inherit the parent VM's NetVM, firewall rules, and RPC policies. Correct?

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Mar 1, 2017

Member

This is about the opposite situation - sensitive is not document opened, but data in private.img of DispVM. DispVM do inherit private.img of it's "DVM template" (read-only, like AppVM have root.img of its template). The thing is, in Qubes 4.0 it will be possible to use any VM as "DVM template" (not only one as in Qubes 3.x), so we should have some safeguard against mistakes I've described. In addition to appropriate qrexec policy.

Member

marmarek commented Mar 1, 2017

This is about the opposite situation - sensitive is not document opened, but data in private.img of DispVM. DispVM do inherit private.img of it's "DVM template" (read-only, like AppVM have root.img of its template). The thing is, in Qubes 4.0 it will be possible to use any VM as "DVM template" (not only one as in Qubes 3.x), so we should have some safeguard against mistakes I've described. In addition to appropriate qrexec policy.

@andrewdavidwong

This comment has been minimized.

Show comment
Hide comment
@andrewdavidwong

andrewdavidwong Mar 1, 2017

Member

Oh, I see. So, the risk is that I open a DispVM based on vault, then I open a malicious document from untrusted in that same DispVM. The malicious document then compromises that DispVM and leaks sensitive data (read-only from vault). Is that right?

Member

andrewdavidwong commented Mar 1, 2017

Oh, I see. So, the risk is that I open a DispVM based on vault, then I open a malicious document from untrusted in that same DispVM. The malicious document then compromises that DispVM and leaks sensitive data (read-only from vault). Is that right?

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Mar 1, 2017

Member
Member

marmarek commented Mar 1, 2017

marmarek added a commit to marmarek/qubes-core-admin that referenced this issue Mar 21, 2017

vm/appvm: add dispvm_allowed property
Speciffy whether DispVM can be created from this AppVM

Fixes QubesOS/qubes-issues#2075
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment