On 27.10.2014 16:37, Andrew B wrote:
> 1) qubes-dom0-update
> "Using xxx as updatevm to download updates for Dom0, this may take some of time..." -> "Using xxx as UpdateVM to download updates for Dom0; this may take some time..."
Fixed.
> 2) qvm-copy (or any RPC service?) to nonexistent domain
> "Domain 'xxx' doesn't exists" -> "Domain 'xxx' doesn't exist"
Fixed.
> 3) Changing the color/label of a running VM
> Window border colors do not change on running VMs (i.e. if it was 'blue' before and changed to 'green', all windows are 'blue' until the VM is restarted). Either the label should not be changed at runtime (so, the drop-down box should be disabled), or the change should immediately affect all windows.
Blocked the change in Qubes Manager.
> Andrew
>
> PS: Is qvm-copy-to-vm not an infoleak? If I copy a file from an exploited
> DispVM to 'vault-supersecret', the exploited DispVM now knows I have a VM
> named 'vault-supersecret'. Not a problem on its own, but could help later
> targeted attacks. Would it not be better to have 'qvm-copy-from-vm'
> instead of 'qvm-copy-to-vm' (i.e. a "pull from" rather than "push to"
> model)?
IMHO this info leak is negligible. If one is aiming for targeted attack,
guessing VM names isn't much a problem (start with defaults like 'banking' for
example). Anyway VM names should give nothing to help with breaking the isolation.
But changing file copy approach, will greatly reduce usability - the user
would need to provide source file path in target VM (additional copy&paste
operation). Even when some special directory would be used for that, one still
need to copy/move the file there first, then launch the copy operation (from
another VM).
BTW Currently RPC target domain do know the source VM name.
--
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?