Kali and qubes

1,190 views
Skip to first unread message

vladimi...@gmail.com

unread,
Feb 5, 2016, 8:50:10 AM2/5/16
to qubes-users
Is it safe dual booting Qube-os R3 and Kali 2.0?

Achim Patzner

unread,
Feb 5, 2016, 9:02:59 AM2/5/16
to qubes...@googlegroups.com


On 02/05/2016 02:50 PM, vladimi...@gmail.com wrote:
> Is it safe dual booting Qube-os R3 and Kali 2.0?

Not less unsafe than anything other dual-booting if there is access to
parts of Qubes.

But where would be the advantage of booting Kali on your physical
hardware? I was always happy to run Kali from a VM I could destroy after
finishing the project I was using it for. And attaching devices via USB
is usually sufficient for this kind of tool.


Achim

Robin Schneider

unread,
Feb 5, 2016, 2:31:42 PM2/5/16
to qubes...@googlegroups.com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

On 05.02.2016 15:02, Achim Patzner wrote:
>
>
> On 02/05/2016 02:50 PM, vladimi...@gmail.com wrote:
>> Is it safe dual booting Qube-os R3 and Kali 2.0?
>
> Not less unsafe than anything other dual-booting if there is access to
> parts of Qubes.

Access to the Qubes installation is only part of the problem. The platform
which is shared between Qubes and a OS that is expected to be less secure is
the second attach surface.

- --
Live long and prosper
Robin `ypid` Schneider
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=CnIV
-----END PGP SIGNATURE-----

Robin Schneider

unread,
Feb 5, 2016, 4:00:14 PM2/5/16
to qubes...@googlegroups.com, Vladimir Augusto Fajardo Rojas
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

On 05.02.2016 21:55, Vladimir Augusto Fajardo Rojas wrote:
> 2016-02-05 14:31 GMT-05:00 Robin Schneider <yp...@riseup.net>: On 05.02.2016
> 15:02, Achim Patzner wrote:
>>>> On 02/05/2016 02:50 PM, vladimi...@gmail.com wrote:
>>>>> Is it safe dual booting Qube-os R3 and Kali 2.0?
>>>>
>>>> Not less unsafe than anything other dual-booting if there is access
>>>> to parts of Qubes.
>
> Access to the Qubes installation is only part of the problem. The platform
> which is shared between Qubes and a OS that is expected to be less secure
> is the second attach surface. Yes, but how could be this posible if I would
> have the qubes dedicated partition encrypted? How could be this less
> secure than having kali on a VM inside qubes?

This has been discussed a number of times on this list. If you want to know
the details, read: https://github.com/rootkovska/x86_harmful

- --
Live long and prosper
Robin `ypid` Schneider
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=v7DL
-----END PGP SIGNATURE-----

nobody

unread,
Feb 5, 2016, 4:05:24 PM2/5/16
to qubes...@googlegroups.com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512



On 02/05/2016 03:59 PM, Robin Schneider wrote:
> On 05.02.2016 21:55, Vladimir Augusto Fajardo Rojas wrote:
>> 2016-02-05 14:31 GMT-05:00 Robin Schneider <yp...@riseup.net>: On
>> 05.02.2016 15:02, Achim Patzner wrote:
>>>>> On 02/05/2016 02:50 PM, vladimi...@gmail.com wrote:
>>>>>> Is it safe dual booting Qube-os R3 and Kali 2.0?
>>>>>
>>>>> Not less unsafe than anything other dual-booting if there
>>>>> is access to parts of Qubes.
>
>> Access to the Qubes installation is only part of the problem. The
>> platform which is shared between Qubes and a OS that is expected
>> to be less secure is the second attach surface. Yes, but how
>> could be this posible if I would have the qubes dedicated
>> partition encrypted? How could be this less secure than having
>> kali on a VM inside qubes?
>
> This has been discussed a number of times on this list. If you want
> to know the details, read:
> https://github.com/rootkovska/x86_harmful
>
>

For example, a compromised Kali installation would be able to `rm -rf
/sys/firmware/efi/efivars` and potentially brick the device it is
installed on.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=V9q+
-----END PGP SIGNATURE-----

Dimitri

unread,
Feb 5, 2016, 5:18:48 PM2/5/16
to qubes-users, vladimi...@gmail.com


Am Freitag, 5. Februar 2016 14:50:10 UTC+1 schrieb vladimi...@gmail.com:
Is it safe dual booting Qube-os R3 and Kali 2.0?

Dual boot is probably not necessary. As Kali is based on Debian it should not be that hard to create a Kali template in Qubes:
* Install debian-8 template
* clone debian-8 template
* add kali repo to /etc/apt/sources.list (something like: deb http://http.kali.org/kali kali main non-free contrib)
* find and add kali signing keys
* then: apt-get update; apt-get install kali-*** (or similar)
* Create a appvm from the kali template and attach necessary devices.

Achim Patzner

unread,
Feb 13, 2016, 11:44:42 AM2/13/16
to qubes...@googlegroups.com
Ok, I tried them all now.

The currently easiest method of getting a Kali-like environment ready
for take-off is cloning the debian-8 template and apply katoolin to it.

Anyone who needs a step by step guide should take a look at
http://www.tecmint.com/install-kali-linux-tools-using-katoolin-on-ubuntu-debian/
but I'm rather certain that anyone needing that kind of instructions
should not handle a toolkit like this.


Achim

Stefan Schlott

unread,
Feb 17, 2016, 3:04:16 AM2/17/16
to qubes...@googlegroups.com
Hi,

> Dual boot is probably not necessary. As Kali is based on Debian it
> should not be that hard to create a Kali template in Qubes:
> * Install debian-8 template
> * clone debian-8 template
> * add kali repo to /etc/apt/sources.list (something like: deb
> http://http.kali.org/kali kali main non-free contrib)
> * find and add kali signing keys
> * then: apt-get update; apt-get install kali-*** (or similar)
> * Create a appvm from the kali template and attach necessary devices.

Just make sure to mask out the X11 packages from Kali; otherwise, you
might accidentially update to them, destroying your Qubes X setup :-)


Stefan.

Iestyn Best

unread,
May 11, 2016, 11:04:30 PM5/11/16
to qubes-users, vladimi...@gmail.com
Hi,

@AndrewDavidWong, is this something else we could add to documentation?

If you require some assistance, I am willing to try and assist where I can.

Andrew David Wong

unread,
May 11, 2016, 11:38:32 PM5/11/16
to Iestyn Best, qubes-users, vladimi...@gmail.com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

On 2016-05-11 20:04, Iestyn Best wrote:
> Hi,
>
> @AndrewDavidWong, is this something else we could add to
> documentation?
>

This is already being tracked here:

https://github.com/QubesOS/qubes-issues/issues/1981

> If you require some assistance, I am willing to try and assist
> where I can.
>

Yes, please do. The best way to help is to send a pull request to
qubes-doc which follows the documentation guidelines and is ready to
be merged.

Documentation guidelines:

https://www.qubes-os.org/doc/doc-guidelines/

- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-----BEGIN PGP SIGNATURE-----
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=MwCK
-----END PGP SIGNATURE-----

vfre...@gmail.com

unread,
May 12, 2016, 1:24:58 AM5/12/16
to Andrew David Wong, qubes-users, vladimi...@gmail.com

Hi Andrew,

 

Thank you for all your assistance.

 

I will look at what I can do with adding the documentation.

 

If I was to create new documnetation, should I be putting it in the unsorted folder? The guide only shows examples for editing existing documents. Can we add something for creating new documents in the document guide?

 

Regards,

Iestyn Best

Andrew David Wong

unread,
May 12, 2016, 2:25:43 AM5/12/16
to vfre...@gmail.com, qubes-users, vladimi...@gmail.com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

On 2016-05-11 22:24, vfre...@gmail.com wrote:
> Hi Andrew,
>
> Thank you for all your assistance.
>
> I will look at what I can do with adding the documentation.
>
> If I was to create new documnetation, should I be putting it in the
> unsorted folder? The guide only shows examples for editing existing
> documents. Can we add something for creating new documents in the
> document guide
>
> Regards, Iestyn Best
>

Generally, if you don't know where a page should go, then it's fine to
add it to the unsorted folder. In the case of a Kali VM page, I think
it would make sense to put that in the "managing-os" folder. I've
started one off for you here:

https://github.com/QubesOS/qubes-doc/edit/master/managing-os/kali.md

I don't think it would be a good idea to have separate steps for
creating new pages. There's usually not much need to be creating new
pages (as compared to editing existing ones), and it's something we
should try to do infrequently, since having too many pages makes
things harder to find and promotes disorganization.

- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-----BEGIN PGP SIGNATURE-----

iQIcBAEBCgAGBQJXNCHgAAoJENtN07w5UDAwRrUP/3/61fk4RMYXIch67hM+rz9g
nmLBmMFeTvPDx0jZ138aPeQIGnv88xNfAWszT5AHSYBmfWOgsbbaCPSD/Dv/LakV
v3VGGPq/N3aWob8Mx9aPQImxB6CPGPqDBrYR8941W6JisPtvG1o83Vps3FGvMiyR
T7Lk4LYqfzfUbXeFCIieej7nmUqspE5JjXqBqJXk/9fxbVUQS1DErmCvXYJiFTbN
iwUFYeQ+SWTmgI9fcQu4esrARvoXFYFeUj7/2mn6sJ7sHDK62E6uxlxOToxOZ7UL
UMi2HVMbTleNTorEcQ0wOIV/0QIrVNVr5clLemaIVHMENiDgwKgrKhVjFOjQwUv1
0nPhP/LedlwZFe7xNHl8RQE+uEJFAPBhouVd/YvowPuFRaFCWRF+wOlNEDmO2Lk9
nL+bYMgIKQGkheG5T6clvAEyDiPkOnXmdloVrtV1Y80ll3fKHgo7dEF02GQ+abSu
tDywyIaJzWJUJVILwcKMm2fvclinUBsj0U2FKXaCgJhOEbFnXWMaOJiAUm670D85
HxV6d+adAbNnlPdQxQu2J/CXQIOtnGojKMqRz3j7Iv88a/g+EfIg7JdW8J6qObyr
P1XTyvcZIoLmjIMhOR9k1SGD2cBlhAkvDc/IRO3XsURRRcZh2729ACrq/V/X5Gv6
A66gJB2yZgB6RoWo2qiW
=OlA8
-----END PGP SIGNATURE-----

vfre...@gmail.com

unread,
May 12, 2016, 7:25:35 PM5/12/16
to Andrew David Wong, qubes-users, vladimi...@gmail.com

Not a problem.

 

I will look at doing what I can to assist as soon as I have the time to commit.

 

 

From: Andrew David Wong
Sent: Thursday, 12 May 2016 4:25 PM
To: vfre...@gmail.com; qubes-users
Cc: vladimi...@gmail.com
Subject: Re: [qubes-users] Re: Kali and qubes

 

-----BEGIN PGP SIGNED MESSAGE-----

Reply all
Reply to author
Forward
0 new messages