-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

On Mon, Feb 19, 2024 at 10:47:45PM +0100, PeakUnshift wrote:
> Hello,
> 
> When using a GuiVM, several issues appear regarding permission errors. I
> created a topic on the forum and opened an issue:
> - 
> https://forum.qubes-os.org/t/grant-full-admin-privileges-to-sys-gui-sys-gui-gpu/24368
> - https://github.com/QubesOS/qubes-issues/issues/8934
> 
> My message here is more general about what privileges a GuiVM should have.
> Currently:
> - dom0 is not accessible from sys-gui, but we can CTRL+ALT+F2 to access tty
> or login back to XFCE's dom0 session.
> - there is no way to access dom0 from sys-gui-gpu because the GPU is not
> attached to it.
> 
> Then, we need a way to get full admin privileges from the GuiVM:
> - Should we grant full admin privileges to the GuiVM?
> - Should we grand full admin privileges to a dedicated AdminVM?
> - Should we create multiple adminVMs for different tasks, but all together,
> give full privileges?
> - Is it just a question of policies or is there other development needed in
> order to execute dom0 commands from a domU?
> 
> I'm aware that the GuiVM is still highly experimental, I try to gather
> information in order to clarify the correct path to follow and thus help
> future contributions.

Generally, the goal is to have specific qrexec services for everything
that needs dom0 action, and then grant access to those, based on some
sensible policy (in default GuiVM case, user controlling GuiVM is fully
in control, but there can be a case where there is separate management
VM for some tasks). It shouldn't be necessary to access dom0 shell at
all. In the current implementation, several of those services are
missing. We collect them in this project:
https://github.com/orgs/QubesOS/projects/15/views/1

So, any missing part should get a ticket that we can add to the project
above. In the meantime, some access to dom0 shell is likely useful -
for sys-gui you found it already, but for sys-gui-gpu probably the
easiest way is to setup something like qubes.VMShell. But remember it
gives sys-gui-gpu unlimited access to dom0 - be careful what you install
in the template for that qube and in the qube itself.

- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
-----BEGIN PGP SIGNATURE-----

iQEzBAEBCAAdFiEEhrpukzGPukRmQqkK24/THMrX1ywFAmXWvoEACgkQ24/THMrX
1yzQJQgAhGLTcIqVZHyNgSFk/J4QmqbIQFhqOobMYiLuEnTbwXKRawtja8mMzZux
fmAwpgGv7BQxGgCJaAsB1vx7oDlz8Vl3yYKLtJapeSfXrMSHrJEKx0Nmudq3YRD1
QN4VMUkVibVbbUwjbZrwaN+t8S2zCFYkxgky4u9n3a2x18NmD2yO7vOsaSFZVb/p
02kEN/8RQJfbsc2BCp+BiK5LNVIFrjZMZ2Gb/ASJAbiVkMEK/KrtEB5BnritQ+hM
GkuUAiKod/CuJKu09nSmmeMXZN2jANVr9WMic/JR1AlMkOUNLvN6wggD5Iadd1Pm
f+IF2ggy7tb2oVbTzlE/nq5BTxQ7mQ==
=oX8Z
-----END PGP SIGNATURE-----

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-devel+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-devel/Zda-gQMVJG9S69nY%40mail-itl.

Reply via email to