Qubes sudo / su / root Hardening - Development Discussion

This won’t work due to No Access to Privilege Escalation Tools for Limited Accounts. We could probably only use overlays / bind mounts for that.

How to make it configurable, qrexec or qvm-service is more of a detail that is easily figured out later. qrexec / qvm-service isn’t the answer to solve the main problem to implement this.

The main challenge for now to implement (passwordless or password protected) sudo in Qubes Template is to deal with No Access to Privilege Escalation Tools for Limited Accounts versus Template persistence and App Qube inheritance.

Protecting the user from oneself is outside the scope of this ticket. There’s a separate topic for that:
walled garden, firewall whitelisting, application whitelisting, sudo lockdown, superuser mode, protected mode

Tor circuits is also a sensitive information. Hence, not accessible by Whonix-Workstation by design.

In Tails such a restriction is useful because it’s not a split-VM design.

1 Like