What path do people generally take?
Interesting idea. For the downside of having to remember extra passwords (for the databases), backups (albeit part of the general backups), and managing the running instances of XKeyPass, you can save a few keystrokes pasting between VM's. It does seem like there are more disadvantages, why not just keep them together in one Vault XKeyPass?
> And there are some types of password I keep in a non-internet-connected
> AppVM, together with some OTP generator scripts. They are meant to be
> used for targets that may be sensitive to large scale attacks (say, home
> banking credentials, amazon AWS otp generators, etc.) where attackers
> may have the financial power to aggressively attack the target AppVM -
> so my line of defense here is to be sure not to have the sensitive
> information available on the filesystem at all.
>
Well they're in the AppVM though so are on the filesystem, aren't they? What you buy is network isolation, effectively air gapping, but even better.
I have no problem with the special cut/paste. Doesn't mean I don't screw it up on occasion, but I do like the assurance of having to do the step
Actually you betray yourself with the correct solution above; the Qubes shortcut to copy/paste between VM's is Ctrl-Shift-C/V which conflicts. I, like you, map that to Ctrl-Alt-C/V so no conflict. I've wondered why that isn't the default since the other is such an obvious conflict.
> Using keepassx on Tails is so much more streamlined, without the extra
> level of copying/pasting. It'd almost be nice if there were some explicit
> dom0 support for it somehow.
Yeah but Tails suffers from the same thing other OS's do which is one big system. So if it was theoretically compromised your streamlined copy/paste is exactly what you don't want.
Nothing you don't know, but I don't want the inter-VM copy/paste to change a bit. It's a small burden for a huge benefit. It also has an additional benefit of each VM having it's own Paste buffer, which ends up being very convenient.
>
> Agreed. I keep my keepass database on one removable device, with a
> keyfile on a separate removable device plus a password. Some cowardly
> creep/crook wants to tamper with my system while I'm out, they're not
> going to get very far.
I'd argue that your actually less secure with that scheme. Johanna made some comments to that effect, what you are doing is a kind of air-gapping, but you have a large attack surface through USB. If an Evil Maid controls your system it does you no good to bring in your passwords on a USB. So, if you're really concerned with that you should be implementing Anti-Evil-Maid on your system as the only defense - not keeping passwords separate.
> Since moving to that approach, I've noticed a lot more "noise" from the
> ones I suspect of being involved in my harassment. Ironically, probably a
> good sign.
OH, OK then you have a situation with a probably not too computer sophisticated opponent. Never mind then.
> But having individual keys for each VM would go further towards one
> stated goal of disallowing each VM or dom0 from being able to snoop on
> each other.
>
That should only be useful against Qubes bugs which allow sibling VM peeking, but otherwise doesn't help.
> Right now, the overall dom0 filesystem is encrypted, which is cool, but
> nothing beyond that, unless you do it yourself. Yeah, more passwords are
> a pain, but if you choose to do so in the name of security, it'd be nice
> if the Manager supported it.
The main problem with it is that the Qubes team is busy and underfunded enough to work on that feature. Their time is better spent making sure there are no chance of sneaky/peaky.