From b0e027ed1c9731a45ad6b5ea3363f124ba2cae35 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Fr=C3=A9d=C3=A9ric=20Pierret=20=28fepitre=29?= Date: Sun, 5 May 2019 14:29:53 +0200 Subject: [PATCH] admin.vm.Terminal: deny by default --- qubes-rpc-policy/admin.vm.Terminal.policy | 2 -- 1 file changed, 2 deletions(-) diff --git a/qubes-rpc-policy/admin.vm.Terminal.policy b/qubes-rpc-policy/admin.vm.Terminal.policy index 8a355b72..a7092332 100644 --- a/qubes-rpc-policy/admin.vm.Terminal.policy +++ b/qubes-rpc-policy/admin.vm.Terminal.policy @@ -3,8 +3,6 @@ ## Please use a single # to start your custom comments -$anyvm $anyvm deny,target=dom0 - # WARNING: The qubes.ShowTerminal service is dangerous and allows any # qube to access any other qube console. It should be restricted # only to management/admin qubes. This is why the default policy is 'deny'