| Hypothetically: Identification attack surface in Qubes OS (any version) | schnuren...@gmail.com | 09/06/18 11:29 | Remember: This is a hypothetic thought Depending on the Qubes Security Bulletin #37 (https://www.qubes-os.org/news/2018/01/11/qsb-37/) it should be theoretically possible to get information about the system and in long term also about the user behind qubes. Because as described in QSB #37 at '## All attacks are read-only', '## Only running VMs are vulnerable', '## Only running VMs are vulnerable' and especially (!) '## Disk encryption and screenlocker passwords are at risk', it is possible to identify someone using any OS (not only linux or a qubes distribution). It is also reboot resistent. Each qubes user (not only) does have an individual storage encrytion password. The statement in QSB, that to make use of a stolen secret, the attacker would have to conduct physical attack on the user's computer is true but not closed. All it needs to get this attack working, seems to depend on the surface (the template VM, used programs and the user behavior) and known bugs/exploits to get in touch with the Spectre Bug on Intel processors. It is possible inside an AppVM do scramble information? About passwords: These are my ideas so far. Gedanken experiment completed. Discussion in qubes-users, workarounds and program progress in github-issues? |
| Re: [qubes-users] Hypothetically: Identification attack surface in Qubes OS (any version) | awokd | 10/06/18 10:24 | True, Qubes relies on VMs not being able to read dom0.
I think you mean making it more difficult to fingerprint VMs, not something like RAM encryption. See https://github.com/QubesOS/qubes-issues/issues/1142, https://github.com/QubesOS/qubes-issues/issues/2361, probably some more I missed/am forgetting! I think Qubes is more concerned about security than getting fingerprinted as a Qubes user. Like you mention, though, using a disposable VM with the same configuration as everyone else goes a long way. Both of these are interesting but seem like it would make data recovery difficult or even impossible if Qubes crashes? |
| Re: [qubes-users] Hypothetically: Identification attack surface in Qubes OS (any version) | schnuren...@gmail.com | 10/06/18 20:25 | Right. If an AppVM can be infiltrated, information like /proc/cpuinfo is from the dom0 cpu, not something standard xen dummy cpu like. This is not much, but in another post (https://www.webhostingtalk.com/showthread.php?t=1048039&highlight=cpucap) the topic is about monitoring and cut resources if a guest is using too much. RAM encryption in VMs is something waiting for us in the near future. > Anonymity can increase security for not telling information about used hardware. > No, why should it? Luks Keychain can, as far as I remember, store maximum 8 different passwords for a storage. Qubes itself would just need 1 keyslot for a randomly created password and immediately switching to it, if dm-crypt allows this. |