2014-08-11 19:38:23 -04:00
---
2021-03-13 13:06:18 -05:00
lang: en
2015-04-10 16:17:45 -04:00
layout: doc
2021-06-16 22:56:25 -04:00
permalink: /doc/vm-sudo/
2015-10-11 03:04:59 -04:00
redirect_from:
2015-10-28 18:14:40 -04:00
- /en/doc/vm-sudo/
2015-10-11 03:04:59 -04:00
- /doc/VMSudo/
- /wiki/VMSudo/
2021-03-13 13:06:18 -05:00
ref: 165
2021-07-09 08:10:44 -04:00
title: Passwordless root access in qubes
2014-08-11 19:38:23 -04:00
---
2020-07-13 07:24:28 -04:00
Background (`/etc/sudoers.d/qubes` in VM):
2015-05-22 16:19:00 -04:00
2021-03-28 14:58:39 -04:00
```
user ALL=(ALL) NOPASSWD: ALL
2016-01-10 18:41:30 -05:00
2021-03-28 14:58:39 -04:00
# WTF?! Have you lost your mind?!
#
# In Qubes VMs there is no point in isolating the root account from
# the user account. This is because all the user data is already
# accessible from the user account, so there is no direct benefit for
# the attacker if she could escalate to root (there is even no benefit
# in trying to install some persistent rootkits, as the VM's root
# filesystem modifications are lost upon each start of a VM).
#
# One might argue that some hypothetical attacks against the
# hypervisor or the few daemons/backends in Dom0 (so VM escape
# attacks) most likely would require root access in the VM to trigger
# the attack.
#
# That's true, but mere existence of such a bug in the hypervisor or
# Dom0 that could be exploited by a malicious VM, no matter whether
# requiring user, root, or even kernel access in the VM, would be
# FATAL. In such situation (if there was such a bug in Xen) there
# really is no comforting that: "oh, but the mitigating factor was
# that the attacker needed root in VM!" We're not M$, and we're not
# gonna BS our users that there are mitigating factors in that case,
# and for sure, root/user isolation is not a mitigating factor.
#
# Because, really, if somebody could find and exploit a bug in the Xen
# hypervisor -- as of 2016, there have been only three publicly disclosed
# exploitable bugs in the Xen hypervisor from a VM -- then it would be
# highly unlikely if that person couldn't also found a user-to-root
# escalation in VM (which as we know from history of UNIX/Linux
# happens all the time).
#
# At the same time allowing for easy user-to-root escalation in a VM
# is simply convenient for users, especially for update installation.
#
# Currently this still doesn't work as expected, because some idotic
# piece of software called PolKit uses own set of policies. We're
# planning to address this in Beta 2. (Why PolKit is an idiocy? Do a
# simple experiment: start 'xinput test' in one xterm, running as
# user, then open some app that uses PolKit and asks for root
# password, e.g. gpk-update-viewer -- observe how all the keystrokes
# with root password you enter into the "secure" PolKit dialog box can
# be seen by the xinput program...)
#
# joanna.
```
2014-08-11 19:38:23 -04:00
Below is a complete list of configuration made according to the above statement, with (not necessary complete) list of mechanisms depending on each of them:
2021-03-13 12:03:23 -05:00
1. sudo (`/etc/sudoers.d/qubes`):
2014-08-11 19:38:23 -04:00
2021-03-13 12:03:23 -05:00
```
user ALL=(ALL) NOPASSWD: ALL
(...)
```
2014-08-11 19:38:23 -04:00
2020-05-03 14:56:31 -04:00
- Easy user -> root access (main option for the user).
- `qvm-usb` (not really working, as of R2).
2014-08-11 19:38:23 -04:00
2021-03-13 12:03:23 -05:00
2. PolicyKit (`/etc/polkit-1/rules.d/00-qubes-allow-all.rules`):
2014-08-11 19:38:23 -04:00
2021-03-13 12:03:23 -05:00
```
//allow any action, detailed reasoning in sudoers.d/qubes
polkit.addRule(function(action,subject) { return polkit.Result.YES; });
```
2014-08-11 19:38:23 -04:00
2020-05-03 14:53:10 -04:00
and `/etc/polkit-1/localauthority/50-local.d/qubes-allow-all.pkla` :
2014-08-11 19:38:23 -04:00
2021-03-13 12:03:23 -05:00
```
[Qubes allow all]
Identity=*
Action=*
ResultAny=yes
ResultInactive=yes
ResultActive=yes
```
2015-02-01 14:59:45 -05:00
2020-05-03 14:56:31 -04:00
- NetworkManager configuration from normal user (`nm-applet`).
- Updates installation (`gpk-update-viewer`).
- User can use pkexec just like sudo Note: above is needed mostly because Qubes user GUI session isn't treated by PolicyKit/logind as "local" session because of the way in which X server and session is started.
2019-08-18 14:25:10 -04:00
Perhaps we will address this issue in the future, but this is really low priority.
Patches welcomed anyway.
2015-02-01 14:59:45 -05:00
2021-03-13 12:03:23 -05:00
3. Empty root password:
2020-05-03 14:56:31 -04:00
- Used for access to 'root' account from text console (`qvm-console-dispvm`) - the only way to access the VM when GUI isn't working.
- Can be used for easy 'su -' from user to root.
2014-08-11 19:38:23 -04:00
2019-05-27 19:17:31 -04:00
Replacing passwordless root access with Dom0 user prompt
--------------------------------------------------------
2015-02-01 15:28:31 -05:00
2023-04-28 10:03:44 -04:00
While the Qubes developers support the statement above, some Qubes users may wish to enable user/root isolation in VMs anyway.
2019-08-18 14:25:10 -04:00
We do not support it in any of our packages, but of course nothing is preventing the user from modifying his or her own system.
2023-07-30 12:03:38 -04:00
A list of steps to do so is provided at [Qubes community, Replacing passwordless root with a dom0 prompt
](https://github.com/Qubes-Community/Contents/blob/master/docs/security/replacing-passwordless-root-with-dom0-prompt.md) **without any guarantee of safety, accuracy, or completeness.
2019-08-18 14:25:10 -04:00
Proceed at your own risk.
Do not rely on this for extra security.**
2015-02-01 15:28:31 -05:00
2019-05-27 19:17:31 -04:00
Dom0 passwordless root access
-----------------------------
2014-08-11 19:38:23 -04:00
2019-08-18 14:25:10 -04:00
There is also passwordless user->root access in dom0.
As stated in comment in sudo configuration there (different one than VMs one), there is really no point in user/root isolation, because all the user data (and VM management interface) is already accessible from dom0 user level, so there is nothing more to get from dom0 root account.