-
-
Notifications
You must be signed in to change notification settings - Fork 50
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
qrexec no longer supports non-executable files in /etc/qubes-rpc #5686
Comments
Qrexec now enforces executable bit on service files. Instead of adding one here, avoid one indirection by using a symlink instead. QubesOS/qubes-issues#5686
Avoid pointless indirection with a script QubesOS/qubes-issues#5686
Avoid useless indirection via extra shell script - symlink directly. This is especially important as new qrexec won't support non-executable service "scripts" in /etc/qubes-rpc. QubesOS/qubes-issues#5686
Automated announcement from builder-github The package
|
Automated announcement from builder-github The package
|
Automated announcement from builder-github The package
|
Qrexec now enforces executable bit on service files. Instead of adding one here, avoid one indirection by using a symlink instead. QubesOS/qubes-issues#5686 (cherry picked from commit fe262aa)
QubesOS/qubes-issues#5686 (cherry picked from commit 27e8d9e)
QubesOS/qubes-issues#5686 (cherry picked from commit 27e8d9e)
QubesOS/qubes-issues#5686 (cherry picked from commit 8faeeee)
QubesOS/qubes-issues#5686 (cherry picked from commit 697f679)
For a long time, files in
/etc/qubes-rpc
could be either a scripts (with executable bit set), or a (non-executable) file with a name of a target script. In practice the later syntax was also interpreted as a script (called with/bin/sh
). This indirection costs extra shell load and is undesirable. It is also confusing when one place a script without executable bit set and it works anyway.Drop this legacy feature and recommend using symlinks instead in case of desired indirection. Or place the script directly in
/etc/qubes-rpc
and make it executable.Most qubes-native services have executable bit set for a long time already.
The change is already made in QubesOS/qubes-core-qrexec#24, this issue serve as a tracking for related changes in documentation, release notes and generally to give it more visibility.
The text was updated successfully, but these errors were encountered: