-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
On 2016-08-25 03:53, Arqwer wrote:
> Command qvm-run '$dispvm' xterm if called from an appVM will run xterm in
> a new dispVM. If attacker gained access to an appvm, he possibly can run
> script, that will create thousands of new dispVMs and freeze my computer.
> I don't like this.
You can configure this easily by editing this file in dom0:
/etc/qubes-rpc/policy/qubes.VMShell
Find this line:
$anyvm $dispvm allow
Change "allow" to "ask". You will now be prompted (by an unspoofable dialog
box in dom0) whenever a VM tries to create a DispVM.
> May be it's better to disable this functionality by default?
Added the suggestion here:
https://github.com/QubesOS/qubes-issues/issues/2269
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-----BEGIN PGP SIGNATURE-----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=xD2n
-----END PGP SIGNATURE-----