Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

qrexec no longer supports non-executable files in /etc/qubes-rpc #5686

Closed
marmarek opened this issue Feb 24, 2020 · 3 comments
Closed

qrexec no longer supports non-executable files in /etc/qubes-rpc #5686

marmarek opened this issue Feb 24, 2020 · 3 comments
Labels
C: doc P: default Priority: default. Default priority for new issues, to be replaced given sufficient information. r4.1-bullseye-cur-test r4.1-buster-cur-test r4.1-centos7-cur-test r4.1-dom0-cur-test r4.1-fc29-cur-test r4.1-fc30-cur-test r4.1-fc31-cur-test r4.1-stretch-cur-test release notes This issue should be mentioned in the release notes.
Milestone

Comments

@marmarek
Copy link
Member

For a long time, files in /etc/qubes-rpc could be either a scripts (with executable bit set), or a (non-executable) file with a name of a target script. In practice the later syntax was also interpreted as a script (called with /bin/sh). This indirection costs extra shell load and is undesirable. It is also confusing when one place a script without executable bit set and it works anyway.

Drop this legacy feature and recommend using symlinks instead in case of desired indirection. Or place the script directly in /etc/qubes-rpc and make it executable.

Most qubes-native services have executable bit set for a long time already.

The change is already made in QubesOS/qubes-core-qrexec#24, this issue serve as a tracking for related changes in documentation, release notes and generally to give it more visibility.

@marmarek marmarek added T: enhancement release notes This issue should be mentioned in the release notes. P: default Priority: default. Default priority for new issues, to be replaced given sufficient information. labels Feb 24, 2020
@marmarek marmarek added this to the Release 4.1 milestone Feb 24, 2020
marmarek added a commit to marmarek/qubes-gui-agent-linux that referenced this issue Feb 24, 2020
Qrexec now enforces executable bit on service files. Instead of adding
one here, avoid one indirection by using a symlink instead.

QubesOS/qubes-issues#5686
marmarek added a commit to marmarek/qubes-app-linux-split-gpg that referenced this issue Feb 24, 2020
marmarek added a commit to marmarek/qubes-gui-daemon that referenced this issue Feb 24, 2020
marmarek added a commit to marmarek/qubes-gui-daemon that referenced this issue Feb 24, 2020
marmarek added a commit to marmarek/qubes-app-linux-split-gpg that referenced this issue Feb 24, 2020
marmarek added a commit to QubesOS/qubes-app-linux-input-proxy that referenced this issue Feb 24, 2020
marmarek added a commit to marmarek/qubes-core-admin-linux that referenced this issue Feb 24, 2020
marmarek added a commit to marmarek/qubes-core-admin that referenced this issue Feb 24, 2020
marmarek added a commit to marmarek/qubes-core-admin that referenced this issue Feb 24, 2020
marmarek added a commit to marmarek/qubes-core-admin that referenced this issue Feb 24, 2020
marmarek added a commit to QubesOS/qubes-app-linux-pdf-converter that referenced this issue Mar 1, 2020
Avoid useless indirection via extra shell script - symlink directly.
This is especially important as new qrexec won't support non-executable
service "scripts" in /etc/qubes-rpc.

QubesOS/qubes-issues#5686
marmarek added a commit to marmarek/qubes-core-admin that referenced this issue Mar 10, 2020
@qubesos-bot
Copy link

Automated announcement from builder-github

The package qubes-core-qrexec_4.1.4-1 has been pushed to the r4.1 testing repository for the Debian template.
To test this update, first enable the testing repository in /etc/apt/sources.list.d/qubes-*.list by uncommenting the line containing stretch-testing (or appropriate equivalent for your template version), then use the standard update command:

sudo apt-get update && sudo apt-get dist-upgrade

Changes included in this update

@qubesos-bot
Copy link

Automated announcement from builder-github

The package core-qrexec has been pushed to the r4.1 testing repository for the CentOS centos7 template.
To test this update, please install it with the following command:

sudo yum update --enablerepo=qubes-vm-r4.1-current-testing

Changes included in this update

@qubesos-bot
Copy link

Automated announcement from builder-github

The package qubes-core-qrexec-4.1.5-1.fc31 has been pushed to the r4.1 testing repository for dom0.
To test this update, please install it with the following command:

sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing

Changes included in this update

marmarek added a commit to QubesOS/qubes-gui-agent-linux that referenced this issue Apr 18, 2020
Qrexec now enforces executable bit on service files. Instead of adding
one here, avoid one indirection by using a symlink instead.

QubesOS/qubes-issues#5686

(cherry picked from commit fe262aa)
marmarek added a commit to QubesOS/qubes-core-admin that referenced this issue Apr 18, 2020
marmarek added a commit to QubesOS/qubes-core-admin that referenced this issue Apr 18, 2020
marmarek added a commit to marmarek/qubes-gui-daemon that referenced this issue May 17, 2020
marmarek added a commit to marmarek/qubes-gui-daemon that referenced this issue May 17, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
C: doc P: default Priority: default. Default priority for new issues, to be replaced given sufficient information. r4.1-bullseye-cur-test r4.1-buster-cur-test r4.1-centos7-cur-test r4.1-dom0-cur-test r4.1-fc29-cur-test r4.1-fc30-cur-test r4.1-fc31-cur-test r4.1-stretch-cur-test release notes This issue should be mentioned in the release notes.
Projects
None yet
Development

No branches or pull requests

3 participants