> A compromised/malicious sourcevm could infect the disk img itself about
> as easily as a tar stream. The questions are: do you consider sourcevm
> safe/trustworthy, and if not then can you operate the vm that will run
> the img with the same lowered level of trust? If sourcevm is
> trustworthy, then I'd surmise there is no risk.
Yes, I'd think that the sourcevm is safe/trustworthy, assuming certain use
cases.
A brand new Qubes AppVM based on built-in Fedora Template is being created
and used as the sourcevm in real-time.
Temporary existence for this sourcevm to get the img file into Qubes,
maybe a little file extraction and conversion work, and then transferred
over to dom0.
Img file is likely either being downloaded within sourcevm or transferred
via external media like USB stick to sourcevm.
Then transferred from this new dedicated temporary sourcevm to dom0. And
the sourcevm is destroyed.
As to the question about differing trust levels between sourcevm and
destvm, that depends upon the individual users specific use case(s). Some
yes. Some no.
But I'd assume a newly created Qubes Fedora AppVM should be
safe/trustworthy onto itself, only to be pretty much used as a dedicated
temporary working file extraction, conversion, and transfer mechanism.
> Using tar in the copy process does pose a slight active risk to the
> destvm, but IMHO it could be worse since compression isn't used. When
> using the alternate method with 'dd', there is no risk until you
> consider mounting the image.
Thanks for the mention of slight active risk increase.
> I don't know about the use of a sha hash, because someone trustworthy
> has to perform it and it sounds like you don't trust sourcevm. If the
> img came from a trustworthy place before it was downloaded to sourcevm,
> then perhaps there is already a hash available from that initial source
> and you could use that to verify the img in your destvm.
Yes... Both SHA512 hashes and GPG signatures are provided by source
developer website.
If user extracts and converts image in-between downloading from website
and booting as root.img in dom0, then there wouldn't be hash or signature
verification ability on the destvm (dom0), and even greater trust would be
placed on all environments the file passes through after wherever such
work is done upon it.
I'm wondering if maybe it would be safer/better/more-trustworthy to do
such extraction (tar) and conversion (qemu-img) of such qcow2 images to
raw images in dom0, after verifying source file download integrity in
final destvm (dom0)?
It would help verify the file integrity for sure, but it would require
installing qemu-img in dom0 and running a tar extract and qemu-img convert
process on a qcow2 image in dom0. Not sure if that adds any greater risk
to the overall system than doing so in a dedicated temporary AppVM as
planned and living with the lack of source file verification after
extraction/conversion? Especially since we're talking about such matters
within dom0, I wonder.