Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Default deny qubes-rpc policies for sd-gpg and sd-svs #175

Closed
emkll opened this issue Oct 29, 2018 · 1 comment
Closed

Default deny qubes-rpc policies for sd-gpg and sd-svs #175

emkll opened this issue Oct 29, 2018 · 1 comment
Assignees
Labels
Milestone

Comments

@emkll
Copy link
Contributor

emkll commented Oct 29, 2018

Qubes rpc policies have an 'ask' default policy:
$anyvm $anyvm ask

This means that an action with no explicit authorization will present a user with the following message:
image

This popup screen requesting authorization might confuse a user and might result in a file being copied, decrypted, or executed, due to user error.

For the VMs used in the context of the SecureDrop Workstation, we should ensure that the default policies for qubes-rpc commands are set to deny other vms. Specifically, qubes.Filecopy, qubes.Gpg, qubes.Openinvm, as well as any other policies that are not required for the functionality.

@kushaldas
Copy link
Contributor

👍 to this feature. Sometimes it is difficult to figure out which process is asking the permission, so default deny is a better option.

Btw, @emkll who took that screenshot? Looks nice 😆

@eloquence eloquence added this to the 0.1.0alpha milestone Oct 31, 2018
@emkll emkll self-assigned this Nov 1, 2018
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

4 participants