qubes.VMRootShell.policy 891 B

123456789101112131415161718192021
  1. ## Note that policy parsing stops at the first match.
  2. ## Add ",user=root" to any ask or allow rules.
  3. ## Please use a single # to start your custom comments
  4. $anyvm $anyvm deny
  5. # WARNING: The qubes.VMRootShell service is dangerous and there are really few
  6. # cases when it could be safely used. Especially when policy set to "ask" you
  7. # have no way to know for sure what command(s) will be called. Compromissed
  8. # source VM can substitute the command. Allowing one VM to execute
  9. # qubes.VMRootShell over the other VM allows the former to TAKE FULL CONTROL over
  10. # the later. In most cases this is not what we want!
  11. #
  12. # Instead we should be using task-specific qrexec services which provide
  13. # assurance as to what program will be responding to the (untrusted) VM
  14. # requests.
  15. #
  16. # See e.g. this thread for some discussion:
  17. # https://groups.google.com/d/msg/qubes-users/xnAByaL_bjI/3PjYdiTDW-0J
  18. #