mirror of
https://github.com/freedomofpress/dangerzone.git
synced 2025-04-28 18:02:38 +02:00

In Qubes the disposable netVM is internet connected. For this reason, on Qubes we chose create our own disposable VM (dz-dvm). However, in reality this could still be bypassed since dz-dvm had the default disposable dispvm. By setting the default_dispvm to '' we prevent this bypass. For VMs users who have already followed the setup instructions, the following command should (to be ran in dom0) will fix this issue: qvm-prefs dz-dvm default_dispvm ''
892 B
892 B
Security Advisory 2023-10-25
For users testing our new Qubes integration (beta), please note that our instructions were missing a configuration detail for disposable VMs which is necessary to fully harden the configuration.
These instructions apply to users who followed the setup instructions before October 25, 2023.
What you need to do: run the following command in dom0:
qvm-prefs dz-dvm default_dispvm ''
Explanation: In Qubes OS, the default template for disposable VMs is network-connected. For this reason, we instruct users to create their own disposable VM (dz-dvm
). However, adversaries with the ability to execute commands on dz-dvm
would also be able open new disposable VMs with the default settings. By setting the default_dispvm to "none" we prevent this bypass.