mirror of
https://github.com/tasket/Qubes-VM-hardening.git
synced 2024-10-01 06:35:42 -04:00
add protection to home/.config/systemd
This commit is contained in:
parent
c989b8bd4a
commit
babfc9bbaa
12
README.md
12
README.md
@ -60,15 +60,16 @@ the /etc/defaults/vms folder is deleted from the running VM (this has no effect
|
||||
### Where to use: Basic examples
|
||||
|
||||
After installing into a template, simply enable `vm-boot-protect-root` service without configuration. Recommended for the following types of VMs:
|
||||
o Service VMs: sys-usb and sys-net.
|
||||
o App VMs: untrusted, personal, banking, vault, etc. This assumes using regular Linux apps without tailored Qubes-specific settings in /rw such as *Firefox, Chromium, Thunderbird, KeePassX, office apps, media playback & editing*, etc. For these and many more, no configuration should be necessary.
|
||||
* Service VMs: sys-usb and sys-net.
|
||||
* App VMs: untrusted, personal, banking, vault, etc. This assumes using regular Linux apps without tailored Qubes-specific settings in /rw such as *Firefox, Chromium, Thunderbird, KeePassX, office apps, media playback & editing*, etc. For these and many more, no configuration should be necessary.
|
||||
|
||||
Examples where `vm-boot-protect-root` requires configuration: sys-vpn (see Notes), Martus and Whonix (needs testing). Note that VMs sys-vpn and sys-firewall are fairly low-risk VMs so there may not be a compelling reason to use the service with them.
|
||||
|
||||
Examples where -root should *not* be enabled:
|
||||
o DispVMs. Sensible option is to enable sudo security for DispVM templates; service can be installed into template and left unused.
|
||||
o Standalone VMs. Plain `vm-boot-protect` makes more sense for these.
|
||||
o Non-Linux VMs (currently unsupported for any mode)
|
||||
* DispVMs. Sensible option is to enable sudo security for DispVM templates; service can be installed into template and left unused.
|
||||
* Whonix VMs. Plain `vm-boot-protect` is best used until Whonix persistence files can be mapped.
|
||||
* Standalone VMs. Plain `vm-boot-protect` makes more sense for these.
|
||||
* Non-Linux VMs (currently unsupported for any mode)
|
||||
|
||||
|
||||
### Scope and Limitations
|
||||
@ -94,6 +95,7 @@ Examples where -root should *not* be enabled:
|
||||
* Currently the service cannot seamlessly handle 'first boot' when the private volume must be initialized. If you enabled the service on a VM before its first startup, on first start the shell will display a notice telling you to restart the VM. Subsequent starts will proceed normally.
|
||||
|
||||
## Releases
|
||||
- v0.8.4 Add protection to /home/user/.config/systemd
|
||||
- v0.8.3 Fix for install script copying to /etc/default/vms
|
||||
- v0.8.2 Working rescue shell. Add sys-net whitelist, sudo config, fixes.
|
||||
- v0.8.0 Adds protection to /rw, file SHA checksums, whitelists, deployment
|
||||
|
2
install
2
install
@ -1,6 +1,6 @@
|
||||
#!/bin/bash
|
||||
# From https://github.com/tasket/Qubes-VM-hardening
|
||||
# installer version 0.8.3
|
||||
# installer version 0.8.4
|
||||
|
||||
set -e
|
||||
[ `id -u` -eq 0 ] || exit
|
||||
|
@ -2,7 +2,7 @@
|
||||
|
||||
## Protect startup of Qubes VMs from /rw content ##
|
||||
## https://github.com/tasket/Qubes-VM-hardening ##
|
||||
## Copyright 2017-2018 Christopher Laprise ##
|
||||
## Copyright 2017-2019 Christopher Laprise ##
|
||||
## tasket@protonmail.com ##
|
||||
|
||||
# This file is part of Qubes-VM-hardening.
|
||||
@ -28,7 +28,7 @@
|
||||
chfiles=".bashrc .bash_profile .bash_login .bash_logout .profile \
|
||||
.xprofile .xinitrc .xserverrc .xsession"
|
||||
chdirs="bin .local/bin .config/autostart .config/plasma-workspace/env \
|
||||
.config/plasma-workspace/shutdown .config/autostart-scripts"
|
||||
.config/plasma-workspace/shutdown .config/autostart-scripts .config/systemd"
|
||||
|
||||
vmname=`qubesdb-read /name`
|
||||
dev=/dev/xvdb
|
||||
@ -36,7 +36,7 @@ rw=/mnt/rwtmp
|
||||
rwbak=$rw/vm-boot-protect
|
||||
errlog=/var/run/vm-protect-error
|
||||
defdir=/etc/default/vms
|
||||
version="0.8.2"
|
||||
version="0.8.4"
|
||||
|
||||
|
||||
# Function: Make user scripts immutable.
|
||||
|
Loading…
Reference in New Issue
Block a user