I was curious of the security implications of setting (in this case sys-audio) as a networking qube (‘Provides network’ so it would show up in the service qube, purely for aesthetic and organizational reasons.
As I am not familiar with the internal networking security of Qubes, and granted I am not setting any other qubes to use sys-audio as it’s networking qube and the networking of sys-audio to ‘none’.
Would there be any security concerns? Would it make the qube more “available” to other compromised qubes in a theoretical scenario?
Restarting just the VM preserves the feature here, but restarting the whole system (or qubesd) indeed unsets servicevm. I should have read the linked commit more carefully, it’s right there in the domain-load handler
This allows you to use sys-audio as the netvm of other qubes. And sys-audio certainly has access to your USB controllers, so if you plug an USB network device, this may expose a qube whose netvm is sys-audio to this device.
So, as long as you do not use sys-audio as a netvm, it’s fine to me.
By the way, sys-usb provides network in the default installation.
Sad, I hope that commit gets fulfilled one day. I imagine it would be possible to set a simple script on boot to set sys-audio to servicevm 1 as a work around.