New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Consider changing qubes.VMShell DispVM default to "ask" #2269

Open
andrewdavidwong opened this Issue Aug 25, 2016 · 0 comments

Comments

Projects
None yet
1 participant
@andrewdavidwong
Member

andrewdavidwong commented Aug 25, 2016

On 2016-08-25 03:53, Arqwer wrote:

Command qvm-run '$dispvm' xterm if called from an appVM will run xterm in a
new dispVM. If attacker gained access to an appvm, he possibly can run
script, that will create thousands of new dispVMs and freeze my computer. I
don't like this. May be it's better to disable this functionality by default?

Users can already configure this by editing /etc/qubes-rpc/policy/qubes.VMShell and changing

$anyvm   $dispvm  allow

to

$anyvm   $dispvm  ask

I interpret the suggestion to be that we make "ask" the default (instead of the current "allow").

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment