Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Discussing the security aspect of Ansible for Qubes OS #15

Open
kushaldas opened this issue Oct 23, 2018 · 1 comment
Open

Discussing the security aspect of Ansible for Qubes OS #15

kushaldas opened this issue Oct 23, 2018 · 1 comment

Comments

@kushaldas
Copy link
Owner

The questions is about the facts/other files/information coming back to the controller node (dom0 in this case), what if there is any hypothetical bug there which can compromise the dom0?

The way it is being handled in Salt right now is documented at QubesOS/qubes-issues#1541 (comment)

I would love to hear the thoughts of both the Ansible and Qubes developers on this point.

@ben-grande
Copy link

Some days after this issue was opened the QSB 45 was released which changed how Salt runs on DomUs:

You possibly already now this by now but I don't see it being used on this repository so leaving it here for reference:

Dom0 copy files to management qube which runs a shell on the target. When dom0 runs directly a shell on the target, it can be compromised as it is way easier to make mistakes and apply filtering.

Dom0 cannot be compromised via escape characters as long as no colors (example) are shown (the default). Dom0 does not retrieve files from the minion (as far as I know), only the log.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants