mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-05-07 09:15:08 -04:00
Qrexec changed
Requesting services without cmdline helper
This commit is contained in:
parent
a6932cd1ce
commit
beba488de3
1 changed files with 5 additions and 0 deletions
|
@ -91,6 +91,11 @@ By default, stderr of client and server is logged to respective `/var/log/qubes/
|
|||
|
||||
Be very careful when coding and adding a new RPC service! Any vulnerability in a RPC server can be fatal to security of the target VM!
|
||||
|
||||
Requesting VM-VM (and VM-Dom0) services execution (without cmdline helper)
|
||||
--------------------------------------------------------------------------
|
||||
|
||||
Connect directly to `/var/run/qubes/qrexec-agent-fdpass` socket as described [here](https://wiki.qubes-os.org/wiki/Qrexec2Implementation#Allthepiecestogetheratwork).
|
||||
|
||||
### Revoking "Yes to All" authorization
|
||||
|
||||
Qubes RPC policy supports the "ask" action. This will prompt the user whether a given RPC call should be allowed. That prompt window has an option to click "Yes to All", which allows the action and adds a new entry to the policy file, which will unconditionally allow further calls for given service-srcVM-dstVM tuple.
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue