mirror of
https://github.com/mirage/qubes-mirage-firewall.git
synced 2024-12-26 23:59:39 -05:00
Do not run tar in dom0 (closes #84).
Do not run tar and bzip2 in dom0 to decompresses and extract archive data created in, or downloaded to domU as any vulnerabilities in them can compromise Qubes OS security model. Instead of that run both tar and bzip2 in domU and copy unikernel to dom0 as described in official Qubes documentation ["Copying from (and to) dom0"](https://www.qubes-os.org/doc/copy-from-dom0/#copying-to-dom0). Auxiliary files required to run unikernel in Qubes OS domU can be easily created directly in dom0 using trusted tools available there.
This commit is contained in:
parent
3ee01b5243
commit
f9842e8b18
17
README.md
17
README.md
@ -48,12 +48,21 @@ However, it should still work fine.
|
||||
|
||||
## Deploy
|
||||
|
||||
If you want to deploy manually, unpack `mirage-firewall.tar.bz2` in dom0, inside `/var/lib/qubes/vm-kernels/`. e.g. (if `dev` is the AppVM where you built it):
|
||||
If you want to deploy manually, unpack `mirage-firewall.tar.bz2` in domU. The tarball contains `vmlinuz`,
|
||||
which is the unikernel itself, plus a couple of dummy files that Qubes requires:
|
||||
|
||||
[tal@dom0 ~]$ cd /var/lib/qubes/vm-kernels/
|
||||
[tal@dom0 vm-kernels]$ qvm-run -p dev 'cat qubes-mirage-firewall/mirage-firewall.tar.bz2' | tar xjf -
|
||||
[user@dev ~]$ tar xjf mirage-firewall.tar.bz2
|
||||
|
||||
The tarball contains `vmlinuz`, which is the unikernel itself, plus a couple of dummy files that Qubes requires.
|
||||
Copy `vmlinuz` to `/var/lib/qubes/vm-kernels/mirage-firewall` directory in dom0, e.g. (if `dev` is the AppVM where you built it):
|
||||
|
||||
[tal@dom0 ~]$ mkdir -p /var/lib/qubes/vm-kernels/mirage-firewall/
|
||||
[tal@dom0 ~]$ cd /var/lib/qubes/vm-kernels/mirage-firewall/
|
||||
[tal@dom0 mirage-firewall]$ qvm-run -p dev 'cat mirage-firewall/vmlinuz' > vmlinuz
|
||||
|
||||
Finally create dummy files required by Qubes OS:
|
||||
|
||||
[tal@dom0 mirage-firewall]$ touch modules.img
|
||||
[tal@dom0 mirage-firewall]$ gzip -n9 < /dev/null > initramfs
|
||||
|
||||
Run this command in dom0 to create a `mirage-firewall` VM using the `mirage-firewall` kernel you added above:
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user