Suggestion: Instead of having "VMs that boot 'cleanly'" I'd propose to add 
following option:

- configuration data that lives in /rw/config (usrlocal) and is cleaned by this 
scripts/services to be fetched from Dom0 (or dedicated VM) based on VM's name.

This should be done after cleanup service and before Qubes code that executes 
/rw/config/rc.local (or sets firewall rules). 

Purpose is to keep current (original 3.2) configuration behavior, while 
ensuring configuration is not modifiable by malware, neither getting 'clean 
boot'.

What do you think?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/63fca7dd-03f6-4be9-b8e6-690fd9a16a82%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to