Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upqubes.RequestRpmInstallinDom0 #2239
Comments
rootkovska
added
enhancement
C: core
P: major
C: mgmt
labels
Aug 7, 2016
rootkovska
added this to the Release 4.0 milestone
Aug 7, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Aug 7, 2016
Member
I think this is really bad idea. This would allow AppVM to trick the user to install potentially harmful package. Lets use os-prober as an example, but there are probably a lot more such harmful packages in the Fedora repositories.
I think the better approach would be to implement #1939 , which may include similar service (qubes.RequestSaltFormulaInstall). The formula would be of course signed (after being reviewed by us). And such formula may request some package being installed of course.
|
I think this is really bad idea. This would allow AppVM to trick the user to install potentially harmful package. Lets use I think the better approach would be to implement #1939 , which may include similar service ( |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
rootkovska
Aug 7, 2016
Member
Only pre-defined AppVM would be allowed to issue the service (enforced via qrexec policy).
|
Only pre-defined AppVM would be allowed to issue the service (enforced via qrexec policy). |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Aug 7, 2016
Member
Still, I think this is a step in wrong direction. This will ease (and maybe even encourage) users/admins to easily break system security. By implementing this service we'll be relying on some network-connected AppVM to not misbehave in order to preserve dom0 isolation. The fact it is only a single AppVM isn't really comforting.
|
Still, I think this is a step in wrong direction. This will ease (and maybe even encourage) users/admins to easily break system security. By implementing this service we'll be relying on some network-connected AppVM to not misbehave in order to preserve dom0 isolation. The fact it is only a single AppVM isn't really comforting. |
rootkovska commentedAug 7, 2016
Usecase: an AppVm downloading a new Qubes Cfg Package (e.g. for setting up YubiKey for Qubes login, or a wallpaper, or whatever) via a nice Internet-connected Appstore-like UI, later offering this RPM for installation and deployment in Dom0.
Of course Dom0 would first verify the digital signature on the RPM offered, same way as it currently does for the Dom0 updates, and install only if signature correct, plus user confirms operation.
Consider also to move the whole Dom0 updating to use this method, i.e. the whole logic triggered by a predefined AppVM rather by Dom0. Of course there is a risk of DoS (i.e. not delivering updates to Dom0 if the AppVM got compromised), but this is the case today anyway.