Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Submit feedback
Contribute to GitLab
Sign in
Toggle navigation
G
Geth-Modification
Project
Project
Details
Activity
Releases
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
张蕾
Geth-Modification
Commits
671f22be
Unverified
Commit
671f22be
authored
Apr 07, 2020
by
rene
Committed by
GitHub
Apr 07, 2020
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
couple of fixes to docs in clef (#20900)
parent
6a3daa2a
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
7 additions
and
7 deletions
+7
-7
setup.md
cmd/clef/docs/setup.md
+7
-7
No files found.
cmd/clef/docs/setup.md
View file @
671f22be
...
...
@@ -34,7 +34,7 @@ There are two ways that this can be achieved: integrated via Qubes or integrated
#### 1. Qubes Integrated
Qubes provdes a facility for inter-qubes communication via
`qrexec`
. A qube can request to make a cross-qube RPC request
Qubes prov
i
des a facility for inter-qubes communication via
`qrexec`
. A qube can request to make a cross-qube RPC request
to another qube. The OS then asks the user if the call is permitted.

...
...
@@ -48,7 +48,7 @@ This is how [Split GPG](https://www.qubes-os.org/doc/split-gpg/) is implemented.

On the
`target`
qubes, we need to define the
rpc
service.
On the
`target`
qubes, we need to define the
RPC
service.
[
qubes.Clefsign
](
qubes/qubes.Clefsign
)
:
...
...
@@ -135,11 +135,11 @@ $ cat newaccnt.json
$
cat
newaccnt.json| qrexec-client-vm debian-work qubes.Clefsign
```
This should pop up first a dialog
to allow the IPC call:
A dialog should pop up first
to allow the IPC call:

Followed by a GTK-dialog to approve the operation
Followed by a GTK-dialog to approve the operation
:

...
...
@@ -169,7 +169,7 @@ However, it comes with a couple of drawbacks:
-
The
`Origin`
header must be forwarded
-
Information about the remote ip must be added as a
`X-Forwarded-For`
. However, Clef cannot always trust an
`XFF`
header,
since malicious clients may lie about
`XFF`
in order to fool the http server into believing it comes from another address.
-
Even with a policy in place to allow
rpc-
calls between
`caller`
and
`target`
, there will be several popups:
-
Even with a policy in place to allow
RPC
calls between
`caller`
and
`target`
, there will be several popups:
-
One qubes-specific where the user specifies the
`target`
vm
-
One clef-specific to approve the transaction
...
...
@@ -177,7 +177,7 @@ However, it comes with a couple of drawbacks:
#### 2. Network integrated
The second way to set up Clef on a qubes system is to allow networking, and have Clef listen to a port which is accessible
f
or
m other qubes.
f
ro
m other qubes.

...
...
@@ -193,6 +193,6 @@ to your computer. Over this new network interface, you can SSH into the device.
Running Clef off a USB armory means that you can use the armory as a very versatile offline computer, which only
ever connects to a local network between your computer and the device itself.
Needless to say,
the
while this model should be fairly secure against remote attacks, an attacker with physical access
Needless to say, while this model should be fairly secure against remote attacks, an attacker with physical access
to the USB Armory would trivially be able to extract the contents of the device filesystem.
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment