From beba488de3dac32c2beb2074af6d91932a3af66c Mon Sep 17 00:00:00 2001 From: Joanna Rutkowska Date: Fri, 10 Oct 2014 09:34:56 +0000 Subject: [PATCH] Qrexec changed Requesting services without cmdline helper --- Qrexec.md | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/Qrexec.md b/Qrexec.md index 0824486b..1b4c1073 100644 --- a/Qrexec.md +++ b/Qrexec.md @@ -91,6 +91,11 @@ By default, stderr of client and server is logged to respective `/var/log/qubes/ Be very careful when coding and adding a new RPC service! Any vulnerability in a RPC server can be fatal to security of the target VM! +Requesting VM-VM (and VM-Dom0) services execution (without cmdline helper) +-------------------------------------------------------------------------- + +Connect directly to `/var/run/qubes/qrexec-agent-fdpass` socket as described [​here](https://wiki.qubes-os.org/wiki/Qrexec2Implementation#Allthepiecestogetheratwork). + ### Revoking "Yes to All" authorization Qubes RPC policy supports the "ask" action. This will prompt the user whether a given RPC call should be allowed. That prompt window has an option to click "Yes to All", which allows the action and adds a new entry to the policy file, which will unconditionally allow further calls for given service-srcVM-dstVM tuple.