mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2024-12-25 15:29:29 -05:00
Fix links
This commit is contained in:
parent
76150ac9d3
commit
a63f24d639
@ -15,7 +15,7 @@ If you're instead looking to upgrade from your current version of Qubes OS to a
|
|||||||
<i class="fa fa-exclamation-triangle"></i>
|
<i class="fa fa-exclamation-triangle"></i>
|
||||||
<b>Warning:</b> Updating with direct commands such as <code>qubes-dom0-update</code>, <code>dnf update</code>, and <code>apt update</code> is <b>not</b> recommended, since these bypass built-in Qubes OS update security measures.
|
<b>Warning:</b> Updating with direct commands such as <code>qubes-dom0-update</code>, <code>dnf update</code>, and <code>apt update</code> is <b>not</b> recommended, since these bypass built-in Qubes OS update security measures.
|
||||||
Instead, we strongly recommend using the <b>Qubes Update</b> tool or its command-line equivalents, as described below.
|
Instead, we strongly recommend using the <b>Qubes Update</b> tool or its command-line equivalents, as described below.
|
||||||
(By contrast, <a href="/doc/software-update-domu/#installing-software-in-templatevms">installing</a> packages using direct package manager commands is fine.)
|
(By contrast, <a href="/doc/how-to-install-software/">installing</a> packages using direct package manager commands is fine.)
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
## Security updates
|
## Security updates
|
||||||
|
@ -341,14 +341,14 @@ In this example, the following keys are stored in the following locations (see b
|
|||||||
This is a network-isolated VM.
|
This is a network-isolated VM.
|
||||||
The initial master keypair and subkeys are generated in this VM.
|
The initial master keypair and subkeys are generated in this VM.
|
||||||
The master secret key *never* leaves this VM under *any* circumstances.
|
The master secret key *never* leaves this VM under *any* circumstances.
|
||||||
No files or text is *ever* [copied](/doc/copying-files#security) or [pasted](/doc/copy-paste#security) into this VM under *any* circumstances.
|
No files or text is *ever* [copied](/doc/how-to-copy-and-move-files/#security) or [pasted](/doc/how-to-copy-and-paste-text/#security) into this VM under *any* circumstances.
|
||||||
|
|
||||||
* `work-gpg`
|
* `work-gpg`
|
||||||
|
|
||||||
This is a network-isolated VM.
|
This is a network-isolated VM.
|
||||||
This VM is used *only* as the GPG backend for `work-email`.
|
This VM is used *only* as the GPG backend for `work-email`.
|
||||||
The secret subkeys (but *not* the master secret key) are [copied](/doc/copying-files#security) from the `vault` VM to this VM.
|
The secret subkeys (but *not* the master secret key) are [copied](/doc/how-to-copy-and-move-files/#security) from the `vault` VM to this VM.
|
||||||
Files from less trusted VMs are *never* [copied](/doc/copying-files#security) into this VM under *any* circumstances.
|
Files from less trusted VMs are *never* [copied](/doc/how-to-copy-and-move-files/#security) into this VM under *any* circumstances.
|
||||||
|
|
||||||
* `work-email`
|
* `work-email`
|
||||||
|
|
||||||
@ -361,7 +361,7 @@ In this example, the following keys are stored in the following locations (see b
|
|||||||
In the standard Split GPG setup, there are at least two ways in which the `work-gpg` VM might be compromised.
|
In the standard Split GPG setup, there are at least two ways in which the `work-gpg` VM might be compromised.
|
||||||
First, an attacker who is capable of exploiting a hypothetical bug in `work-email`'s [MUA](https://en.wikipedia.org/wiki/Mail_user_agent) could gain control of the `work-email` VM and send a malformed request which exploits a hypothetical bug in the GPG backend (running in the `work-gpg` VM), giving the attacker control of the `work-gpg` VM.
|
First, an attacker who is capable of exploiting a hypothetical bug in `work-email`'s [MUA](https://en.wikipedia.org/wiki/Mail_user_agent) could gain control of the `work-email` VM and send a malformed request which exploits a hypothetical bug in the GPG backend (running in the `work-gpg` VM), giving the attacker control of the `work-gpg` VM.
|
||||||
Second, a malicious public key file which is imported into the `work-gpg` VM might exploit a hypothetical bug in the GPG backend which is running there, again giving the attacker control of the `work-gpg` VM.
|
Second, a malicious public key file which is imported into the `work-gpg` VM might exploit a hypothetical bug in the GPG backend which is running there, again giving the attacker control of the `work-gpg` VM.
|
||||||
In either case, such an attacker might then be able to leak both the master secret key and its passphrase (if any is used, it would regularly be input in the work-gpg VM and therefore easily obtained by an attacker who controls this VM) back to the `work-email` VM or to another VM (e.g., the `netvm`, which is always untrusted by default) via the Split GPG protocol or other [covert channels](/doc/data-leaks).
|
In either case, such an attacker might then be able to leak both the master secret key and its passphrase (if any is used, it would regularly be input in the work-gpg VM and therefore easily obtained by an attacker who controls this VM) back to the `work-email` VM or to another VM (e.g., the `netvm`, which is always untrusted by default) via the Split GPG protocol or other [covert channels](/doc/data-leaks/).
|
||||||
Once the master secret key is in the `work-email` VM, the attacker could simply email it to himself (or to the world).
|
Once the master secret key is in the `work-email` VM, the attacker could simply email it to himself (or to the world).
|
||||||
|
|
||||||
In the alternative setup described in this section (i.e., the subkey setup), even an attacker who manages to gain access to the `work-gpg` VM will not be able to obtain the user's master secret key since it is simply not there.
|
In the alternative setup described in this section (i.e., the subkey setup), even an attacker who manages to gain access to the `work-gpg` VM will not be able to obtain the user's master secret key since it is simply not there.
|
||||||
|
Loading…
Reference in New Issue
Block a user