Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upAllow starting only selected AppVMs as DispVM #2075
Comments
marmarek
added
enhancement
C: core
P: major
labels
Jun 16, 2016
marmarek
added this to the Release 4.0 milestone
Jun 16, 2016
added a commit
to marmarek/old-qubes-core-admin
that referenced
this issue
Jun 16, 2016
added a commit
to marmarek/old-qubes-core-admin
that referenced
this issue
Jun 16, 2016
added a commit
to marmarek/old-qubes-core-admin
that referenced
this issue
Jun 16, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
|
What is the intended benefit of this? |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Feb 28, 2017
Member
Avoid mistakes like opening untrusted (or in fact: any) document in DispVM based on some private-data-holding VM (like vault).
|
Avoid mistakes like opening untrusted (or in fact: any) document in DispVM based on some private-data-holding VM (like |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
andrewdavidwong
Mar 1, 2017
Member
Avoid mistakes like opening untrusted (or in fact: any) document in DispVM based on some private-data-holding VM (like vault).
Accidentally opening a sensitive file in a DispVM is only a problem if the DispVM does not inherit the parent VM's NetVM, firewall rules, and RPC policies. Correct?
Accidentally opening a sensitive file in a DispVM is only a problem if the DispVM does not inherit the parent VM's NetVM, firewall rules, and RPC policies. Correct? |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Mar 1, 2017
Member
This is about the opposite situation - sensitive is not document opened, but data in private.img of DispVM. DispVM do inherit private.img of it's "DVM template" (read-only, like AppVM have root.img of its template). The thing is, in Qubes 4.0 it will be possible to use any VM as "DVM template" (not only one as in Qubes 3.x), so we should have some safeguard against mistakes I've described. In addition to appropriate qrexec policy.
|
This is about the opposite situation - sensitive is not document opened, but data in private.img of DispVM. DispVM do inherit private.img of it's "DVM template" (read-only, like AppVM have root.img of its template). The thing is, in Qubes 4.0 it will be possible to use any VM as "DVM template" (not only one as in Qubes 3.x), so we should have some safeguard against mistakes I've described. In addition to appropriate qrexec policy. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
andrewdavidwong
Mar 1, 2017
Member
Oh, I see. So, the risk is that I open a DispVM based on vault, then I open a malicious document from untrusted in that same DispVM. The malicious document then compromises that DispVM and leaks sensitive data (read-only from vault). Is that right?
|
Oh, I see. So, the risk is that I open a DispVM based on |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Mar 1, 2017
Member
|
On Wed, Mar 01, 2017 at 01:55:22AM -0800, Andrew David Wong wrote:
Oh, I see. So, the risk is that I open a DispVM based on `vault`, then I open a malicious document from `untrusted` in that same DispVM. The malicious document then compromises that DispVM and leaks sensitive data (read-only from `vault`). Is that right?
Yes, exactly.
…--
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
|
marmarek commentedJun 16, 2016
Follow up from #866 - allow only selected AppVMs to be started as DispVM. It should be a VM property like
dispvm.The property should affect following things:
read-writetooriginIt shouldn't be possible to change the property when VM is running or there exists any DispVM based on it.
Related task: after implementing this property, add support for old
dispvm_netvmsetting to migration tool.