qubes.VMShell.policy 1.3 KB

1234567891011121314151617181920212223242526272829
  1. ## Note that policy parsing stops at the first match,
  2. ## so adding anything below "$anyvm $anyvm action" line will have no effect
  3. ## Please use a single # to start your custom comments
  4. $anyvm $dispvm allow
  5. $anyvm $anyvm deny
  6. # WARNING: The qubes.VMShell service is dangerous and there are really few
  7. # cases when it could be safely used. Allowing one VM to execute qubes.VMShell
  8. # over the other VM allows the former to TAKE FULL CONTROL over the later. In
  9. # most cases this is not what we want!
  10. #
  11. # Instead we should be using task-specific qrexec services which provide
  12. # assurance as to what program will be responding to the (untrusted) VM
  13. # requests.
  14. #
  15. # It is, however, safe, in most cases, to allow ultimate control of the
  16. # creating AppVM over the DisposableVM it creates as part of the qrexec service
  17. # invocation. That's why by default we have "$anyvm $dispvm allow" rule. Note
  18. # that it does _not_ allow any AppVM to execute qubes.VMShell service over any
  19. # DispVM created in the system -- that would obviously be wrong. It only allows
  20. # qubes.VMShell service access to the AppVM which creates the DispVM as part of
  21. # this very service invocation.
  22. #
  23. # See e.g. this thread for some discussion:
  24. # https://groups.google.com/d/msg/qubes-users/xnAByaL_bjI/3PjYdiTDW-0J
  25. #
  26. #