Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Use allow-all-names instead of allow-unsafe-characters #508

Merged
merged 1 commit into from
Jun 25, 2024

Conversation

DemiMarie
Copy link
Contributor

As pointed out by Andrew David Wong the latter name is unnecessarily alarming. No backwards compatibility is provided because users should not need to remember to blocklist two different strings in their qrexec policies. Denying "+allow-all-names" should be sufficient.

Reported-by: Andrew David Wong [email protected]
Fixes: QubesOS/qubes-issues#8332 (for real this time)

As pointed out by Andrew David Wong the latter name is unnecessarily
alarming.  No backwards compatibility is provided because users should
not need to remember to blocklist two different strings in their qrexec
policies.  Denying "+allow-all-names" should be sufficient.

Reported-by: Andrew David Wong <[email protected]>
Fixes: QubesOS/qubes-issues#8332 (for real this time)
Copy link

codecov bot commented Jun 24, 2024

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 70.14%. Comparing base (a728c79) to head (59d94f3).

Additional details and impacted files
@@            Coverage Diff             @@
##             main     #508      +/-   ##
==========================================
- Coverage   70.57%   70.14%   -0.43%     
==========================================
  Files           3        3              
  Lines         469      469              
==========================================
- Hits          331      329       -2     
- Misses        138      140       +2     

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

marmarek added a commit to marmarek/qubes-core-admin that referenced this pull request Jun 24, 2024
It was renamed from allow-unsafe-characters to allow-all-names

See QubesOS/qubes-core-agent-linux#508

QubesOS/qubes-issues#8332
@marmarek marmarek merged commit 59d94f3 into QubesOS:main Jun 25, 2024
2 of 4 checks passed
@DemiMarie DemiMarie deleted the fix-name branch June 25, 2024 02:24
marmarek added a commit to QubesOS/qubes-core-admin that referenced this pull request Jun 25, 2024
It was renamed from allow-unsafe-characters to allow-all-names

See QubesOS/qubes-core-agent-linux#508

QubesOS/qubes-issues#8332
(cherry picked from commit 872119f)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

File-copy qrexec service is overly restrictive
2 participants