I wonder where to start… or whether I should stop altogether. Anyway, let’s give it one more try and see if things would get any better:
@DVM
You can’t compare the in-qube workflow with the actions done inside dom0. From a security perspective, sending users to dom0 every time they want something new in their template/qubes is not the best idea. dom0 needs to be left alone as much as possible, even more so when we are talking about beginners. What’s the point of redirecting them to dom0 when they can sudo apt/dnf in an isolated system that can’t harm anything else around it?
I was never even planning to compare anything. The comparison was necessary in the context of the usability argument which you brought in. Now, after it was shown that usability is unrelated, you switch to defending security and put yet another counter question. OK, I will “answer”:
What is the actual harm of running qvm-run --user root VMNAME command
in dom0? How is running sudo command
in VMNAME more secure?
Furthermore (to make this at least a little on-topic):
How exactly is sudo command
in VMNAME with unrestricted root more secure than the alternative in the case of restricted root?
Excuse me, but then why is this thread there?
Are you saying you posted multiple times without understanding the reason for the thread?
You want restricted root by default
I never said that. It’s not even the topic.
and defend its use inside all qubes,
Can you differentiate between “I am not an expert and I want to understand the logic of A, because its currently documented basis is unsound” and “I am here to defend the opposite of A”?
Also, can you differentiate between “I say this should be so” and “I provide a quote by someone who thinks this should be so, after having said the opposite previously”?
but you can’t point to any benefits that might validate your concerns?
My concern is the self-contradictory reasoning in the “WTF” document. That has been pointed to in the OP.
There’s no point in adding something if there’s no benefit to the end user.
Would you agree that applies to providing beneficial and punctual answers as well? (example: @marmarek for Q4)
@fsflover
Which root-only-readable secrets do you have
/rw/config/NM-system-connections/*
containing all network passwords (for example)
and why are they not compartmentalized into a dedicated vault qube?
These files are in the standard sys-net and have root:root 700 restrictions.
So: passwordless root + root:root 700 permissions. If you see any logic in that, I don’t. As you see, that has absolutely nothing to do with protecting Xen as a #1 priority.