Hi Stuart,
Philosophies aside, you can do whatever you want :) Adding networking
to dom0 is certainly defeating a lot of the hardwork/security that went
into qubes. If you wanted to go this route you might consider just
running Xen directly? Especially if you are putting this in your
closet/basement?
There is another issue however, aside from just giving dom0 network
access, and that's the LUKS password. If you needed to reboot the
machine entirely from remote, you'd be stuck if you had LUKS encryption
on the disk with no way to enter it remotely.
Unless.... you do what I did, and hook up a Raspberry Pi to the serial
console of my machine, and update the kernel boot line in grub to use
the serial console (Note: This REQUIRES you to use the serial console to
enter the LUKS password, you lose the ability to enter it from your
keyboard locally).
Stating the obvious, if someone gets access to the Raspberry Pi I'd be
in a bit of trouble, though as long as I remember to log out of the
shell at the serial console on the Pi, someone compromising that machine
does not immediately give them access to the Qubes box, they would have
to guess my password or wait for me to log back in and enter it if I
didn't know they were there and they could capture it. I run OSSEC on
this PI to help combat that issue.
Also considering defense in depth, I can only access that Raspberry Pi
via VPN, I do NOT expose it directly to the internet, it also sits on
it's own VLAN which I leave isolated, so when I do have to do remote
administration I first have to grant access to that VLAN from my router
console.
So at the end of the day, less secure? Yes. Added convenience? Yes.
Added complexity? Yes...
You can draw the line wherever you want :)
Ed