Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Centralized Qubes Policy #867

Open
marmarek opened this issue Mar 8, 2015 · 4 comments
Open

Centralized Qubes Policy #867

marmarek opened this issue Mar 8, 2015 · 4 comments
Labels
C: core help wanted This issue will probably not get done in a timely fashion without help from community contributors. P: major Priority: major. Between "default" and "critical" in severity.

Comments

@marmarek
Copy link
Member

marmarek commented Mar 8, 2015

Reported by joanna on 2 Jun 2014 12:51 UTC
Should include:

  • qrexec policy (including improvements tracked by Containers tags/attributes #865 -- tag-based rules)
  • networking inter-VM policy
  • Admin API policy (if not covered by qrexec policy), see Qubes Admin API #853
  • Policy for specific Qubes applications (e.g. for magic MIME handlers)

Some properties we want:

  • hashable (for remote attestation)
  • easily backup'able
  • easily decomposable into parts (?) (e.g. policy for containers tagged as "corporate" should be hashable separate from the policy applicable to other containers, e.g. personal).

Migrated-From: https://wiki.qubes-os.org/ticket/867

@marmarek marmarek added this to the Release 3 milestone Mar 8, 2015
@marmarek marmarek added enhancement C: core P: major Priority: major. Between "default" and "critical" in severity. labels Mar 8, 2015
@marmarek marmarek modified the milestones: Release 4.0, Release 3.0 May 13, 2015
@andrewdavidwong andrewdavidwong added the help wanted This issue will probably not get done in a timely fashion without help from community contributors. label Jun 9, 2016
andrewdavidwong added a commit that referenced this issue Jun 9, 2016
@jpouellet
Copy link
Contributor

e.g. policy for containers tagged as "corporate" should be hashable separate from the policy applicable to other containers, e.g. personal

Is it a goal to enable a single qubes machine to both have policy enforced by a remote administrator and simultaneously be trustworthy for personal (private) use!?

@marmarek
Copy link
Member Author

It's indeed tricky. But I think it's possible. The basic idea is "management VM can manage only VMs it created". This also applies to templates etc. Some more design documentation will be soon.

@jpouellet
Copy link
Contributor

I think maybe this can be closed now?

@andrewdavidwong
Copy link
Member

I think maybe this can be closed now?

My impression is that it may not be completely done yet, but I'm curious what @marmarek thinks.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
C: core help wanted This issue will probably not get done in a timely fashion without help from community contributors. P: major Priority: major. Between "default" and "critical" in severity.
Projects
None yet
Development

No branches or pull requests

3 participants