Those are redundant, and yaml parser strips them in fact. By removing them, loading and saving yaml file without any change indeed produce the same output. This is useful for prepare_for_translation.py script (which adds lang and ref tags) - to produce only change that indeed was made.
13 KiB
lang | layout | permalink | redirect_from | ref | title | ||||
---|---|---|---|---|---|---|---|---|---|
en | doc | /doc/qrexec-internals/ |
|
39 | Qrexec: Qubes RPC Internals |
(This page details the current implementation of qrexec (qrexec3). A general introduction to qrexec is also available. For the implementation of qrexec2, see here.)
The qrexec framework consists of a number of processes communicating with each other using a common IPC protocol, described in detail below.
Components residing in the same domain (qrexec-client-vm
to qrexec-agent
, qrexec-client
to qrexec-daemon
) use local sockets as the underlying transport medium.
Components in separate domains (qrexec-daemon
to qrexec-agent
, data channel between qrexec-agent
s) use vchan links.
Because of vchan limitation, it is not possible to establish qrexec connection back to the source domain.
Dom0 tools implementation
The following programs handle parts of the framework: sending and receiving requests, verifying permissions, and administering connections. These tools are not designed to be used by users directly.
qrexec-daemon
/usr/sbin/qrexec-daemon
One instance is required for every active domain.
qrexec-daemon
is responsible for both:
- handling execution and service requests from dom0 (source:
qrexec-client
); and - handling service requests from the associated domain (source:
qrexec-client-vm
, thenqrexec-agent
).
Command line usage:
qrexec-daemon domain-id domain-name [default user]
domain-id
: Numeric Qubes ID assigned to the associated domain.domain-name
: Associated domain name.default user
: Optional. If passed,qrexec-daemon
uses this user as default for all execution requests that don't specify one.
qrexec-client
/usr/bin/qrexec-client
Used to pass execution and service requests to qrexec-daemon
.
Command line usage:
-d target-domain-name
: Specifies the target for the execution/service request.-l local-program
: Optional. If present,local-program
is executed and its stdout/stdin are used when sending/receiving data to/from the remote peer.-e
: Optional. If present, stdout/stdin are not connected to the remote peer. Only process creation status code is received.-c <request-id,src-domain-name,src-domain-id>
: used for connecting a VM-VM service request byqrexec-policy
. Details described below in the service example.cmdline
: Command line to pass toqrexec-daemon
as the execution/service request. Service request format is described below in the service example.
VM tools implementation
qrexec-agent
/usr/lib/qubes/qrexec-agent
One instance runs in each active domain. Responsible for:
- Handling service requests from
qrexec-client-vm
and passing them to connectedqrexec-daemon
in dom0. - Executing associated
qrexec-daemon
execution/service requests.
The qrexec-agent
command takes no parameters.
qrexec-client-vm
/usr/bin/qrexec-client-vm
Runs in an active domain.
Used to pass service requests to qrexec-agent
.
Command line usage:
qrexec-client-vm target-domain-name service-name local-program [local program arguments]
target-domain-name
: Target domain for the service request. Source is the current domain.service-name
: Requested service name.local-program
:local-program
is executed locally and its stdin/stdout are connected to the remote service endpoint.
Qrexec protocol details
The qrexec protocol is message-based. All messages share a common header followed by an optional data packet.
/* uniform for all peers, data type depends on message type */
struct msg_header {
uint32_t type; /* message type */
uint32_t len; /* data length */
};
When two peers establish connection, the server sends MSG_HELLO
followed by peer_info
struct:
struct peer_info {
uint32_t version; /* qrexec protocol version */
};
The client then should reply with its own MSG_HELLO
and peer_info
.
The lower of two versions define protocol used for this connection.
If either side does not support this version, the connection is closed.
Details of all possible use cases and the messages involved are described below.
dom0: request execution of cmd
in domX
-
dom0:
qrexec-client
is invoked in dom0 as follows:qrexec-client -d domX [-l local_program] user:cmd
(If
local_program
is set,qrexec-client
executes it and uses that child's stdin/stdout in place of its own when exchanging data withqrexec-agent
later.)qrexec-client
translates that request into aMSG_EXEC_CMDLINE
message sent toqrexec-daemon
, withconnect_domain
set to 0 (connect to dom0) and `connect_port also set to 0 (allocate a port). -
dom0:
qrexec-daemon
allocates a free port (in this case 513), and sends aMSG_EXEC_CMDLINE
back to the client with connection parameters (domX and 513) and with command field empty.qrexec-client
disconnects from the daemon, starts a vchan server on port 513 and awaits connection.Then,
qrexec-daemon
passes on the request asMSG_EXEC_CMDLINE
message to theqrexec-agent
running in domX. In this case, the connection parameters are dom0 and 513. -
domX:
qrexec-agent
receivesMSG_EXEC_CMDLINE
, and starts the command (user:cmd
, orcmd
as useruser
). If possible, this is actually delegated to a separate server (qrexec-fork-server
) also running on domX.After starting the command,
qrexec-fork-server
connects toqrexec-client
in dom0 over the provided vchan port 513. -
Data is forwarded between the
qrexec-client
in dom0 and the command executed in domX usingMSG_DATA_STDIN
,MSG_DATA_STDOUT
andMSG_DATA_STDERR
.Empty messages (with data
len
field set to 0 inmsg_header
) are an EOF marker. Peer receiving such message should close the associated input/output pipe.When
cmd
terminates, domX'sqrexec-fork-server
sendsMSG_DATA_EXIT_CODE
header toqrexec-client
followed by the exit code (int).
domX: request execution of service admin.Service
in dom0
-
domX:
qrexec-client-vm
is invoked as follows:qrexec-client-vm dom0 admin.Service [local_program] [params]
(If
local_program
is set, it will be executed in domX and connected to the remote command's stdin/stdout).qrexec-client-vm
connects toqrexec-agent
and requests service execution (admin.Service
) in dom0.qrexec-agent
assigns an internal identifier to the request. It's based on a file descriptor of the connectedqrexec-client-vm
: in this case,SOCKET11
.qrexec-agent
forwards the request (MSG_TRIGGER_SERVICE3
) to its correspondingqrexec-daemon
running in dom0. -
dom0:
qrexec-daemon
receives the request and triggersqrexec-policy
program, passing all necessary parameters: source domain domX, target domain dom0, serviceadmin.Service
and identifierSOCKET11
.qrexec-policy
evaluates if the RPC should be allowed or denied, possibly also launching a GUI confirmation prompt.(If the RPC is denied, it returns with exit code 1, in which case
qrexec-daemon
sends aMSG_SERVICE_REFUSED
back). -
dom0: If the RPC is allowed,
qrexec-policy
will launch aqrexec-client
with the right command:qrexec-client -d dom0 -c domX,X,SOCKET11 "QUBESRPC admin.Service domX name dom0"
The
-c domX,X,SOCKET11
are parameters indicating how connect back to domX and pass its input/output.The command parameter describes the RPC call: it contains service name (
admin.Service
), source domain (domX
) and target description (name dom0
, could also be e.g.keyword @dispvm
). The target description is important in case the original target wasn't dom0, but the service is executing in dom0.qrexec-client
connects to aqrexec-daemon
for domX and sends aMSG_SERVICE_CONNECT
with connection parameters (dom0, and port 0, indicating a port should be allocated) and request identifier (SOCKET11
).qrexec-daemon
allocates a free port (513) and sends back connection parameters toqrexec-client
(domX port 513).qrexec-client
starts the command, and tries to connect to domX over the provided port 513.Then,
qrexec-daemon
forwards the connection request (MSG_SERVICE_CONNECT
) toqrexec-agent
running in domX, with the right parameters (dom0 port 513, requestSOCKET11
). -
dom0: Because the command has the form
QUBESRPC: ...
, it is started through thequbes-rpc-multiplexer
program with the provided parameters (admin.Service domX name dom0
). That program finds and executes the necessary script in/etc/qubes-rpc/
. -
domX:
qrexec-agent
receives theMSG_SERVICE_CONNECT
and passes the connection parameters back to the connectedqrexec-client-vm
. It identifies theqrexec-client-vm
by the request identifier (SOCKET11
means file descriptor 11).qrexec-client-vm
starts a vchan server on 513 and receives a connection fromqrexec-client
. -
Data is forwarded between dom0 and domX as in the previous example (dom0-VM).
domX: invoke execution of qubes service qubes.Service
in domY
-
domX:
qrexec-client-vm
is invoked as follows:qrexec-client-vm domY qubes.Service [local_program] [params]
(If
local_program
is set, it will be executed in domX and connected to the remote command's stdin/stdout). -
The request is forwarded as
MSG_TRIGGER_SERVICE3
toqrexec-daemon
running in dom0, then toqrexec-policy
, then (if allowed) toqrexec-client
.This is the same as in the previous example (VM-dom0).
-
dom0: If the RPC is allowed,
qrexec-policy
will launch aqrexec-client
with the right command:qrexec-client -d domY -c domX,X,SOCKET11 user:cmd "DEFAULT:QUBESRPC qubes.Service domX"
The
-c domX,X,SOCKET11
are parameters indicating how connect back to domX and pass its input/output.The command parameter describes the service call: it contains the username (or
DEFAULT
), service name (qubes.Service
) and source domain (domX
).qrexec-client
will then send aMSG_EXEC_CMDLINE
message toqrexec-daemon
for domY. The message will be with port number 0, requesting port allocation.qrexec-daemon
for domY will allocate a port (513) and send it back. It will also send aMSG_EXEC_CMDLINE
to its corresponding agent. (It will also translateDEFAULT
to the configured default username).Then,
qrexec-client
will also sendMSG_SERVICE_CONNECT
message to domX's agent, indicating that it should connect to domY over port 513.Having notified both domains about a connection,
qrexec-client
now exits. -
domX:
qrexec-agent
receives aMSG_SERVICE_CONNECT
with connection parameters (domY port 513) and request identifier (SOCKET11
). It sends the connection parameters back to the rightqrexec-client-vm
.qrexec-client-vm
starts a vchan server on port 513. note that this is different than in the other examples:MSG_SERVICE_CONNECT
means you should start a server,MSG_EXEC_CMDLINE
means you should start a client. -
domY:
qrexec-agent
receives aMSG_EXEC_CMDLINE
with the command to execute (user:QUBESRPC...
) and connection parameters (domX port 513).It forwards the request to
qrexec-fork-server
, which handles the command and connects to domX over the provided port.Because the command is of the form
QUBESRPC ...
,qrexec-fork-server
starts it usingqubes-rpc-multiplexer
program, which finds and executes the necessary script in/etc/qubes-rpc/
. -
After that, the data is passed between domX and domY as in the previous examples (dom0-VM, VM-dom0).
qrexec-policy
implementation
qrexec-policy
is a mechanism for evaluating whether an RPC call should be allowed. For introduction, see Qubes RPC administration.
qrexec-policy-daemon
This is a service running in dom0. It is called by qrexec-daemon
and is responsible for evaluating the request and possibly launching an action.
The daemon listens on a socket (/var/run/qubes/policy.sock
). It accepts requests in the format described in qrexec-policy-daemon.rst and replies with result=allow/deny
.
A standalone version is called qrexec-policy-exec
and is available as a fallback.
qrexec-policy-agent
This is a service running in the GuiVM. It is called by qrexec-policy-daemon
in order to display prompts and notifications to the user.
It is a socket-based Qubes RPC service. Requests are in JSON format, and response is simple ASCII.
There are two endpoints:
policy.Ask
- ask the user about whether to execute a given actionpolicy.Notify
- notify the user about about an action.
See qrexec-policy-agent.rst for protocol details.