Hi all,I took a break from setting up my Qubes OS machine and now I'm looking to finish the job and actually settle in. I am familiar with the overall layout and functions of the OS as a whole, but want to shore up the security of my individual VMs, with Debian running everything except for dom0. I know that isolation should do most of the work, but if further hardening my VMs will add more hurdles for attackers while being of minimal cost to me, why not?For now, I plan on proper firewalling, activating apparmor, installing taskett-hardening, and reducing attack surfaces where possible.Specific question: how would one strip down non-app VMs (sys-net, sys-USB, sys-firewall, whonix-gw) to minimize their attack surfaces? Aside from common-sense hardening and operation of app VMs, these seem to be the most exposed and therefore most vulnerable.More generally: what steps have you taken to harden your VMs?
1st, I second all of this.2nd, I run a VPN off of the minimal template (technically a double vpn, but it's probably overkill)3rd, on my todo list, create a scratch template with even less than the minimal for these functions4th, only wired networking bc all the insecurity regarding wifi.5th, any applications I don't trust (like Zoom) I run off disposable vms.6th, don't have any hardware VMs running if you aren't actively using them7th, add a root password to all VMs8th, make sure your firewall disallows connections between VMs (granted this is qubes default)9th, add outbound firewall rules to each VM as appropriate10th, don't tell people your qubes configuration (I'm kinda fucking up that one right now :p)11th, use tor if you're seriously concerned about privacy (even though that double vpn was overkill, and this probably moreso)12th, use both DNSSec and DNS over TLS13th, test dns leak with regards to vpn14th, reply in line and don't top post... Okay, not security, just good manners15th, also strip down bios surface (remove possibilities of remote connections, disable any hardware you aren't likely to use, etc.)Codially,Emlay
HiChanging the hostname is interesting especially for laptop. When you are connecting to any network, your hostname is sent with your MAC address to the DHCP server thus leaving a trace in the log of your presence on that network. Also, the sys-net hostname is very unique and stands out of a list of computer name like the default Windows computer name.Concerning the IDS/IPS (Intrustion Detection System/Intrusion Prevention System) I would be interesting to analyzing the traffic with a qubes and being able to alert or even create firewall rules on alert at one point. This is probably a big projet to do!!!And sorry for top posting, I am sending a lot of email and I am so used to click reply and start typing!!!Regards,
Dominique
1) Is there a resource out there that teaches newbies how to configure minimal templates for different uses? e.g. For VPN, services, apps, etc.