On 12/20/2016 06:35 PM, Patrick Schleizer wrote:
- /usr/local/etc/qubes-bind-dirs.d/50_user.conf
- Qubes-Whonix specific /usr/local/etc/whonix_firewall.d

(/usr/local is stored in /rw anyhow.)

I don't propose abolishing existing implementations using /rw.

- It would suffice if we keep this in mind for new developments. I.e. if
some new Qubes functionality wants provide TemplateBasedVM specific "/rw
style" settings, make that '/usr/local/etc/...' instead.


Before including standard config paths into the template-based scheme for private storage, I think we have to ask how many other non-Qubes programs will end up using these paths and thus inadvertently causing settings and scripts to persist. And under what conditions does this become undesirable? Would malware that is not Qubes-aware try to propagate through a folder like /usr/local/etc?

Chris

--
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-devel/71f96f3b-e946-ee13-ff31-0cba86f75cbe%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.

Reply via email to