files/32-securedrop-workstation.policy (58 lines of code) (raw):

## Configure Qubes RPC "deny" policies for SecureDrop Workstation. # # This file is provisioned by secureDrop-workstation-dom0-config. # Do not modify this file! # # As a general strategy, in addition to explicit grants, we provide # catch-all deny policies for SDW-provisioned VMs. # # Qubes suggests the allow policies be evaluated after (with a higher file # number than) the deny policies, but due to the way SDW policies are stacked at # the moment, we reverse this suggested order. # # We also want SDW policies in the new format to be evaluated before the legacy # compatibility policies (`/etc/qubes/policy.d/35-compat.policy`), to avoid # having to maintain two sets of policies. We therefore choose policy file numbers # between 30 (used by system, `/etc/qubes/policy.d/30-qubesctl-salt.policy) and 35 # (legacy compatibility, as above). This way, if users have legacy compatibility # policies defined for non-SecureDrop Workstation qubes, they will be evaluated # normally and will not be broken by SecureDrop Workstation, but will not be # evaluated before our own policies. securedrop.Log * @anyvm @anyvm deny securedrop.Proxy * @anyvm @anyvm deny qubes.GpgImportKey * @anyvm @tag:sd-workstation deny qubes.GpgImportKey * @tag:sd-workstation @anyvm deny qubes.Gpg * @anyvm @tag:sd-workstation deny qubes.Gpg * @tag:sd-workstation @anyvm deny # Future: qubes-app-linux-split-gpg2 qubes.Gpg2 * @anyvm @tag:sd-workstation deny qubes.Gpg2 * @tag:sd-workstation @anyvm deny qubes.USBAttach * @anyvm @tag:sd-workstation deny qubes.USBAttach * @tag:sd-workstation @anyvm deny qubes.USB * @anyvm @tag:sd-workstation deny qubes.USB * @tag:sd-workstation @anyvm deny qubes.PdfConvert * @anyvm @tag:sd-workstation deny qubes.PdfConvert * @tag:sd-workstation @anyvm deny # TODO: should this be handled with the new Global Config UI instead? qubes.ClipboardPaste * @anyvm @tag:sd-workstation deny qubes.ClipboardPaste * @tag:sd-workstation @anyvm deny qubes.FeaturesRequest * @anyvm @tag:sd-workstation deny qubes.FeaturesRequest * @tag:sd-workstation @anyvm deny qubes.Filecopy * @anyvm @tag:sd-workstation deny qubes.Filecopy * @tag:sd-workstation @anyvm deny qubes.GetImageRGBA * @anyvm @tag:sd-workstation deny qubes.GetImageRGBA * @tag:sd-workstation @anyvm deny qubes.OpenInVM * @anyvm @tag:sd-workstation deny qubes.OpenInVM * @tag:sd-workstation @anyvm deny qubes.OpenURL * @anyvm @tag:sd-workstation deny qubes.OpenURL * @tag:sd-workstation @anyvm deny qubes.StartApp * @anyvm @tag:sd-workstation deny qubes.StartApp * @tag:sd-workstation @anyvm deny qubes.VMRootShell * @anyvm @tag:sd-workstation deny qubes.VMRootShell * @tag:sd-workstation @anyvm deny qubes.VMShell * @anyvm @tag:sd-workstation deny qubes.VMShell * @tag:sd-workstation @anyvm deny qubes.VMExec * @anyvm @tag:sd-workstation deny qubes.VMExec * @tag:sd-workstation @anyvm deny qubes.VMExecGUI * @anyvm @tag:sd-workstation deny qubes.VMExecGUI * @tag:sd-workstation @anyvm deny