Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Central secrets portal implementation #9729

Open
DemiMarie opened this issue Jan 22, 2025 · 0 comments
Open

Central secrets portal implementation #9729

DemiMarie opened this issue Jan 22, 2025 · 0 comments
Labels
C: core P: default Priority: default. Default priority for new issues, to be replaced given sufficient information. security This issue pertains to the security of Qubes OS.

Comments

@DemiMarie
Copy link

The problem you're addressing (if any)

Qubes OS relies on in-VM implementations of the secrets portal. These cannot interact with e.g. the lock screen, and may change when the user changes templates. Also, having a separate secrets service for each VM is less than great.

The solution you'd like

Have a centrally-managed secret service that also implements the portal interface. The secret service will track data across VM renames and backups, and will be independent of whatever the VM chooses.

The value to a user and who that user might be

All users will benefit from better UX. For instance, redundant “Do you want to create this keyring?” prompts will be eliminated.

Completion criteria checklist

No response

@DemiMarie DemiMarie added the P: default Priority: default. Default priority for new issues, to be replaced given sufficient information. label Jan 22, 2025
@andrewdavidwong andrewdavidwong added C: core security This issue pertains to the security of Qubes OS. labels Jan 25, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
C: core P: default Priority: default. Default priority for new issues, to be replaced given sufficient information. security This issue pertains to the security of Qubes OS.
Projects
None yet
Development

No branches or pull requests

2 participants