Skip to content

Commit 4e57403

Browse files
committed
Disallow dangerous qrexec operations
Whonix-Workstation should never need to open a file, URL, or application in anything other than a Whonix-Workstation disposable VM. Allowing it to even ask to do one of these actions in an unsafe way is dangerous, since a user who isn't paying enough attention might allow the request and leak their IP address in so doing (for instance, by visiting an attacker-provided URL in a VM that has clearnet access). Don't allow Whonix-Workstation to take (or ask to take) any of these dangerous actions.
1 parent d1fb89a commit 4e57403

File tree

1 file changed

+12
-0
lines changed

1 file changed

+12
-0
lines changed

qubes-rpc-policy/80-whonix.policy

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,3 +11,15 @@ whonix.GatewayCommand +restart @tag:anon-gateway @tag:anon-vm allow autost
1111
whonix.GatewayCommand +stop @tag:anon-gateway @tag:anon-vm allow autostart=no
1212
whonix.GatewayCommand +showlog @tag:anon-gateway @tag:anon-vm allow autostart=no
1313
whonix.GatewayCommand * @anyvm @anyvm deny
14+
15+
# Harden against potential IP leaks by not allowing a compromised
16+
# Whonix-Workstation to open files, URLs, or applications in VMs other than
17+
# Whonix-Workstation DispVMs.
18+
qubes.OpenInVM * @tag:anon-vm @dispvm allow
19+
qubes.OpenInVM * @tag:anon-vm @anyvm deny
20+
21+
qubes.OpenURL * @tag:anon-vm @dispvm allow
22+
qubes.OpenURL * @tag:anon-vm @anyvm deny
23+
24+
qubes.StartApp * @tag:anon-vm @dispvm allow
25+
qubes.StartApp * @tag:anon-vm @anyvm deny

0 commit comments

Comments
 (0)