-
-
Notifications
You must be signed in to change notification settings - Fork 48
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Make dom0 read-only #5777
Comments
Maybe it's possible to adapt fedora silverblue for that purpose. |
At one point, the devs mentioned the possibility of having a "completely sealed" dom0 that users can't even directly interact with, so they've certainly considered this. |
When comparing two root snapshots per
And then we compare the content of the filesystems, we see that:
Would need to be out of root fs to be able to have a RO QubesOS dom0 with dmverity Originally posted by @tlaurion in #4371 (comment) |
Describe the solution you'd like
make dom0 readonly. Build a customized readonly rootfs instead of using Fedora.
Where is the value to a user, and who might that user be?
Make QubesOS more secure
Relevant documentation you've consulted
https://www.qubes-os.org/news/2020/03/18/gui-domain/
Because the GUI will be separated from dom0, users no longer need to modify the files of dom0
The text was updated successfully, but these errors were encountered: