Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Disable executable scripts in AppVMs other than sd-app #1141

Closed
eloquence opened this issue Aug 24, 2020 · 3 comments · Fixed by #1153
Closed

Disable executable scripts in AppVMs other than sd-app #1141

eloquence opened this issue Aug 24, 2020 · 3 comments · Fixed by #1153

Comments

@eloquence
Copy link
Member

eloquence commented Aug 24, 2020

In the current template consolidation plan (freedomofpress/securedrop-workstation#471) we anticipate that the securedrop-client package will end up being installed in AppVMs that don't need it, e.g., sd-proxy. We want to ensure that the client is not accidentally opened in a VM in which it is not meant to be run. While RPC policies will restrict the proper functioning of the client in any VM other than sd-app, we should still prevent it from being run to reduce confusion.

We want to ensure that client-specific configurations and scripts are not installed in those VMs. In addition to MIME types (tracked in freedomofpress/securedrop-builder#188 and freedomofpress/securedrop-workstation#603), that includes the two executable scripts in the files folder:

  • securedrop-client
  • sd-app-qubes-gpg-domain.sh (sets the QUBES_GPG_DOMAIN environment variable used to configure the Qubes GPG wrapper in the split GPG architecture)
@eloquence
Copy link
Member Author

eloquence commented Aug 24, 2020

One option @emkll and I discussed today was to check hostname of the VM, and exit out if these scripts are invoked in a VM other than sd-app.

@eloquence eloquence added this to Near Term - SD Workstation in SecureDrop Team Board Aug 26, 2020
@sssoleileraaa
Copy link
Contributor

sssoleileraaa commented Sep 16, 2020

If we enforce app-to-vm execution restrictions, then i want to advocate for a way to easily disable this when running securedrop-workstation in "dev" mode. I used to do development in the sd-managed vms, but now I use a much more developer-friendly system of developing client and sdk in a dev vm (not sd-app) and the proxy in a dev vm (not sd-proxy). This also allows us to generate sdk cassettes for api calls over qrexec, see https://github.com/freedomofpress/securedrop-sdk/blob/30a28463270ffc44bfaeb89776e5a4addc9c3e8a/README.md#generating-cassettes-for-api-calls-over-qrexec.

@eloquence
Copy link
Member Author

That makes sense -- perhaps we could override the name of the VM via env var, or disable those checks in a dev environment altogether.

@emkll emkll moved this from Near Term - SD Workstation to In Development in SecureDrop Team Board Sep 30, 2020
SecureDrop Team Board automation moved this from In Development to Done Oct 6, 2020
emkll added a commit to freedomofpress/securedrop-workstation that referenced this issue Oct 14, 2020
QUBES_GPG_DOMAIN will be conditionally set based on the running VM in order to support template consolidation. See freedomofpress/securedrop-client#1141
emkll added a commit to freedomofpress/securedrop-workstation that referenced this issue Oct 14, 2020
QUBES_GPG_DOMAIN will be conditionally set based on the running VM in order to support template consolidation. See freedomofpress/securedrop-client#1141
emkll added a commit to freedomofpress/securedrop-workstation that referenced this issue Oct 14, 2020
QUBES_GPG_DOMAIN will be conditionally set based on the running VM in order to support template consolidation. See freedomofpress/securedrop-client#1141
emkll added a commit to freedomofpress/securedrop-workstation that referenced this issue Oct 14, 2020
QUBES_GPG_DOMAIN will be conditionally set based on the running VM in order to support template consolidation. See freedomofpress/securedrop-client#1141
emkll added a commit to freedomofpress/securedrop-workstation that referenced this issue Oct 15, 2020
QUBES_GPG_DOMAIN will be conditionally set based on the running VM in order to support template consolidation. See freedomofpress/securedrop-client#1141
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
No open projects
Development

Successfully merging a pull request may close this issue.

2 participants