mirror of
https://github.com/freedomofpress/dangerzone.git
synced 2025-04-28 18:02:38 +02:00

In Qubes the disposable netVM is internet connected. For this reason, on Qubes we chose create our own disposable VM (dz-dvm). However, in reality this could still be bypassed since dz-dvm had the default disposable dispvm. By setting the default_dispvm to '' we prevent this bypass. For VMs users who have already followed the setup instructions, the following command should (to be ran in dom0) will fix this issue: qvm-prefs dz-dvm default_dispvm ''
13 lines
892 B
Markdown
13 lines
892 B
Markdown
# Security Advisory 2023-10-25
|
|
|
|
For users testing our [new Qubes integration (beta)](https://github.com/freedomofpress/dangerzone/blob/main/INSTALL.md#qubes-os), please note that our instructions were missing a configuration detail for disposable VMs which is necessary to fully harden the configuration.
|
|
|
|
These instructions apply to users who followed the setup instructions **before October 25, 2023**.
|
|
|
|
**What you need to do:** run the following command in dom0:
|
|
|
|
```bash
|
|
qvm-prefs dz-dvm default_dispvm ''
|
|
```
|
|
|
|
**Explanation**: In Qubes OS, the default template for disposable VMs is network-connected. For this reason, we instruct users to create their own disposable VM (`dz-dvm`). However, adversaries with the ability to execute commands on `dz-dvm` would also be able open new disposable VMs with the default settings. By setting the default_dispvm to "none" we prevent this bypass.
|