qubes.RequestRpmInstallinDom0 #2239
Labels
C: core
C: mgmt
P: major
Priority: major. Between "default" and "critical" in severity.
R: declined
Resolution: While a legitimate bug or proposal, it has been decided that no action will be taken.
T: enhancement
Type: enhancement. A new feature that does not yet exist or improvement of existing functionality.
Usecase: an AppVm downloading a new Qubes Cfg Package (e.g. for setting up YubiKey for Qubes login, or a wallpaper, or whatever) via a nice Internet-connected Appstore-like UI, later offering this RPM for installation and deployment in Dom0.
Of course Dom0 would first verify the digital signature on the RPM offered, same way as it currently does for the Dom0 updates, and install only if signature correct, plus user confirms operation.
Consider also to move the whole Dom0 updating to use this method, i.e. the whole logic triggered by a predefined AppVM rather by Dom0. Of course there is a risk of DoS (i.e. not delivering updates to Dom0 if the AppVM got compromised), but this is the case today anyway.
The text was updated successfully, but these errors were encountered: