You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The questions is about the facts/other files/information coming back to the controller node (dom0 in this case), what if there is any hypothetical bug there which can compromise the dom0?
Dom0 copy files to management qube which runs a shell on the target. When dom0 runs directly a shell on the target, it can be compromised as it is way easier to make mistakes and apply filtering.
Dom0 cannot be compromised via escape characters as long as no colors (example) are shown (the default). Dom0 does not retrieve files from the minion (as far as I know), only the log.
The questions is about the facts/other files/information coming back to the controller node (
dom0
in this case), what if there is any hypothetical bug there which can compromise thedom0
?The way it is being handled in Salt right now is documented at QubesOS/qubes-issues#1541 (comment)
I would love to hear the thoughts of both the Ansible and Qubes developers on this point.
The text was updated successfully, but these errors were encountered: