-
Notifications
You must be signed in to change notification settings - Fork 47
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Simplification: reconsider necessity of sd-log #1239
Comments
I should also add that I do see a few scenarios where
However, this is not the case as of today and is not in the roadmap. |
There is one downside that came to me after - as sd-* are app or dispvms, some system logs might get wiped with shutdown. application logs would persist for sd-app and -proxy though. |
Good point. I added that to the list of "current properties of sd-log":
|
I'm a bit outside in the Qubes loop, I'd be curious to know what kind of involvement of system services is in the communication and parsing now, versus how much would be if we removed the logging Qube. My question is to understand the attack surface now in dom0 versus the attack surface later. So now we pass through the qrexec or whatever communication daemon, and then it gets consumed by sd-log. But if we, change the target app, wouldn't this bring as dom0 attack surface the dom0 rsyslogd? |
Thanks for chiming in. In reality we're not adding any more attack surface than what's already there. The system logs from the various Qubes are already available in dom0. It's not exactly the same data, but we can make it be the same. The dom0 logs are basically the console output of the VMs ( If you're curious, you can check out what the logs look like by downloading from OpenQA (here, for example) the file So as long as we don't do any additional parsing, the attack surface should be pretty much the same. If anything, it decreases because there is one less VM in the game, as in "one less VM to hack" (e.g. if there is an issue with the |
Fair point. I think a simple user log-viewer interface with a simple button to share logs (#529) could be a pragmatic way to avoid telling people to do things in dom0. Technically it's still dom0, but a much more narrow-focused / less complex task. |
Description
With @zenmonkeykstop we came to the conclusion that sd-log may not need to exist, especially given what it currently provides.
Properties of sd-log:
What would replace it?
System logs are already available in dom0. So technically we don't need to log collection server. We still need to setup logging in applications such that it goes to syslog, but the rest feels a bit duplicated.
We could later even add a little utility to view the logs like what qubes manager does. Something extremely simple:
Is there something that we're missing here? If the above assumptions / properties are correct all that we'd need to ensure is that the logs in dom0 are append-only.
How will this impact SecureDrop/SecureDrop Workstation users?
It should not.
How would this affect the SecureDrop Workstation threat model?
It should not.
The text was updated successfully, but these errors were encountered: