Some more content
4.0 KiB
layout | title | permalink |
---|---|---|
wiki | Qrexec2Implementation | /wiki/Qrexec2Implementation/ |
Implementation of qrexec in Qubes R2
This page describes implementation of the qrexec framework in Qubes OS R2. Note that the implementation has changed significantly in Qubes R3 (see Qrexec3Implementation), although the user API reminded backwards compatible (i.e. qrexec apps written for Qubes R2 should run without modifications on Qubes R3).
Dom0 tools implementation
Players:
/usr/lib/qubes/qrexec-daemon
<- started by mgmt stack (qubes.py) when a VM is started./usr/lib/qubes/qrexec-policy
<- internal program used to evaluate the policy file and making the 2nd half of the connection./usr/lib/qubes/qrexec-client
<- raw command line tool that talks to the daemon via unix socket (/var/run/qubes/qrexec.XID
)
Note: neither of the above tools are designed to be used by users.
Linux VMs implementation
Players:
/usr/lib/qubes/qrexec-agent
<- started by VM bootup scripts, a daemon./usr/lib/qubes/qubes-rpc-multiplexer
<- executes the actual service program, as specified in VM's/etc/qubes-rpc/qubes.XYZ
/usr/lib/qubes/qrexec-client-vm
<- raw command line tool that talks to the agent
Note: neither of the above tools are designed to be used by users. qrexec-client-vm
is designed to be wrapped up by Qubes apps.
Windows VMs implemention
TODO
All the pieces together at work
Note: this section is not needed to use qrexec for writing Qubes apps. Also note the qrexec framework implemention in Qubes R3 significantly differs from what is described in this section.
The VM-VM channels in Qubes R2 are made via "gluing" two VM-Dom0 and Dom0-VM vchan connections:
Note: Dom0 never examines the actual data flowing in neither of the two vchan connections.
When a user in a source VM executes qrexec-client-vm
utility, the following steps are taken:
qrexec-client-vm
connects toqrexec-agent
's/var/run/qubes/qrexec-agent-fdpass
unix socket 3 times. Reads 4 bytes from each of them, which is the fd number of the accepted socket in agent. These 3 integers, in text, concatenated, form "connection identifier" (CID)qrexec-client-vm
writes to/var/run/qubes/qrexec-agent
fifo a blob, consisting of target vmname, rpc action, and CIDqrexec-client-vm
executes the rpc client, passing the above mentioned unix sockets as process stdin/stdout, and optionally stderr (if the PASS_LOCAL_STDERR env variable is set)qrexec-agent
passes the blob toqrexec-daemon
, via MSG_AGENT_TO_SERVER_TRIGGER_CONNECT_EXISTING message over vchanqrexec-daemon
executesqrexec-policy
, passing source vmname, target vmname, rpc action, and CID as cmdline argumentsqrexec-policy
evaluates the policy file. If successful, creates a pair ofqrexec-client
processes, whose stdin/stdout are cross-connencted.- The first
qrexec-client
connects to the src VM, using the-c ClientID
parameter, which results in not creating a new process, but connecting to the existing process file descriptors (these are the fds of unix socket created in step 1). - The second
qrexec-client
connects to the target VM, and executesqubes-rpc-multiplexer
command there with the rpc action as the cmdline argument. Finally,qubes-rpc-multiplexer
executes the correct rpc server on the target.
- The first
- In the above step, if the target VM is
$dispvm
, the dispvm is created via theqfile-daemon-dvm
program. The latter waits for theqrexec-client
process to exit, and then destroys the dispvm.
Protocol description ("wire-level" spec)
TODO