Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Document that NetVMs of Windows VMs must be trusted #7688

Open
DemiMarie opened this issue Aug 11, 2022 · 0 comments
Open

Document that NetVMs of Windows VMs must be trusted #7688

DemiMarie opened this issue Aug 11, 2022 · 0 comments
Labels
C: doc P: major Priority: major. Between "default" and "critical" in severity. security This issue pertains to the security of Qubes OS. T: enhancement Type: enhancement. A new feature that does not yet exist or improvement of existing functionality.

Comments

@DemiMarie
Copy link

How to file a helpful issue

The problem you're addressing (if any)

Windows VMs use a netfront driver that is not hardened against attacks by a malicious netback driver. Worse, #7687 means that if a Windows VM is running any of a variety of network services, any other Windows VMs based on the same template could attack it easily, needing only the ability to make a network connection to said VM.

The solution you'd like

Document that the NetVM of a Windows VM must be as trusted as the Windows VM itself, and that allowing incoming network connections to any Windows VM other than a StandaloneVM is a terrible idea.

The value to a user, and who that user might be

Users who use Windows VMs will be less likely to expose them to attack.

@DemiMarie DemiMarie added T: enhancement Type: enhancement. A new feature that does not yet exist or improvement of existing functionality. P: default Priority: default. Default priority for new issues, to be replaced given sufficient information. security This issue pertains to the security of Qubes OS. labels Aug 11, 2022
@andrewdavidwong andrewdavidwong added this to the Non-release milestone Aug 11, 2022
@andrewdavidwong andrewdavidwong added P: major Priority: major. Between "default" and "critical" in severity. and removed P: default Priority: default. Default priority for new issues, to be replaced given sufficient information. labels Aug 11, 2022
@andrewdavidwong andrewdavidwong removed this from the Non-release milestone Aug 13, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
C: doc P: major Priority: major. Between "default" and "critical" in severity. security This issue pertains to the security of Qubes OS. T: enhancement Type: enhancement. A new feature that does not yet exist or improvement of existing functionality.
Projects
None yet
Development

No branches or pull requests

2 participants