-
-
Notifications
You must be signed in to change notification settings - Fork 48
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Make disposable root volumes inherit read-only status from their disposable templates #6625
Comments
To clarify applications running in that AppVM could still from their point of view have write access to /, correct? As mentioned #1293 (comment) doesn't the same thing need to happen for DispVM's home volume? |
Yes and yes. The latter will require additional support from within the DispVM. |
No, it makes sense only for encrypted volatile volume. And that makes sense only for rather niche threat model. For everybody else, implementing this will regress performance and likely disk usage. |
Does this mean that this is a "won't do" or that the request should be amended to change "by default" to "optionally"? |
The initial proposal assumed the volatile encryption was enabled by default, which was later reverted. One thing that would make sense, is the read-only root be inherited by DispVMs from their disposable template, which I think isn't the case right now. |
Sounds like the last part is the only thing you're confident would be a suitable enhancement right now, so I've reduced the scope of this issue down to just that. Other stuff can be opened as separate issues in the future. |
The problem you're addressing (if any)
Currently, root volumes are read-write by default, even though the writes are thrown away after the qube is shut down. However, the data written is not encrypted with an ephemeral key, so sensitive information could persist indefinitely after it should have been deleted. QubesOS/qubes-core-admin#396 will encrypt all volatile volumes by default, but root volumes need to be read-only for maximum benefit.
Describe the solution you'd like
Root volumes should be read-only. This will cause the AppVMs to set up a
dm-snapshot
device that allows them to be written to, which will write the changes to the private volume. When the AppVM is shut down, the volatile volume will be securely deleted by deleting the encryption key.Where is the value to a user, and who might that user be?
All users will benefit from improved security.
Describe alternatives you've considered
We could do something similar in dom0, but that is extra complexity.
Additional context
Relevant documentation you've consulted
Related, non-duplicate issues
#4408
The text was updated successfully, but these errors were encountered: