Most active commenters
  • Syonyk(4)
  • fsflover(3)
  • snvzz(3)

←back to thread

176 points TheFreim | 18 comments | | HN request time: 0.001s | source | bottom
1. legrande ◴[] No.36685913[source]
What kind of threat model requires someone to use Qubes? I know Snowden uses it and there's even a testimonial of him on the Qubes site recommending it. Is this for people on 'lists' or are high value targets because they visited the wrong site or said something the authorities didn't like and their machines are now being targeted?
replies(6): >>36685957 #>>36685977 #>>36686014 #>>36686031 #>>36686103 #>>36686127 #
2. beardog ◴[] No.36685957[source]
Honestly you don't need to be super paranoid to benefit from Qubes. Windows and Linux default sandboxing is still pretty mediocre at best, people can't be perfect with security all the time and sometimes even legit programs get compromised, so the sandboxing security model helps contain the damage.

That said you can still setup sandboxing without Qubes.

3. fsflover ◴[] No.36685977[source]
I would say, almost anyone running anything untrusted from time to time can benefit from the strong hardware virtualization.

Qubes is my daily driver by the way. My attempt of explaining it to a layman: https://forum.qubes-os.org/t/how-to-pitch-qubes-os/4499/15

replies(1): >>36686431 #
4. thoughtbag ◴[] No.36686014[source]
I know what Theo says about (x86) virtualization[1], but I think it's still useful to virtually separate your random browsing the web from things like health and banking, or where you keep your ssh keys (if you don't use a Yubikey or similar to keep it off your laptop) -- or other secrets.

You can be a victim of a random drive-by, you don't have to be a person on a "list".

[1] https://marc.info/?l=openbsd-misc&m=119318909016582

replies(1): >>36686341 #
5. weinzierl ◴[] No.36686031[source]
I used it for sifting through job applications (see my other comment).

I think it was worth it because even though we were a small boring company we received a fair share of drag-net style malware via the application channels.

Some of the attempts were pretty good also. I used to joke that the bad guys tailor their cover letters better than most real applicants. Which of course is a bit of a hyperbole, but there is a kernel of truth. It's not too hard to write a believable application letter that fits the archetypal IT position. Similar to not all fishing mails being full of spelling errors malicious application letters aren't either.

I don't know if we ever received a targeted attack, but I wouldn't know. I think bigger companies certainly will and I can only consider every HR department a high risk area.

6. vitehozonage ◴[] No.36686103[source]
I'd say everyone that has the ability to use it. Society is in a dark age where basically nothing else is fit for use; one bad click on most machines could compromise you for years, it is an insane situation. Even if you have other needs that can't be fulfilled with Qubes, you should have a Qubes machine for other tasks that are security-sensitive
7. Syonyk ◴[] No.36686127[source]
> What kind of threat model requires someone to use Qubes?

"Not trusting modern software to be correct nor secure" is sufficient.

I do almost all my web browsing in disposable VMs with no access to interesting things like my password manager, email, SSH keys, etc. I also run JITless (disable Javascript JIT engine), because those are a common attack point on browsers.

If you compromise my browser from a random site, you get nothing of interest. Even if you pop the kernel. You still have to get through Xen to get to anything I consider of value.

replies(2): >>36687359 #>>36687759 #
8. Syonyk ◴[] No.36686341[source]
Yeah. He's probably right. When we first saw Meltdown/Spectre/etc, and he preemtively disabled hyperthreading out of an abundance of paranoia, turned out he was right...

It's all broken, all the way down. However, compromising a browser or kernel is still a lot easier than compromising a hypervisor. At least in terms of number of known exploits.

Qubes tends to make very limited use of the riskier parts of Xen anyway, though. A lot of the security notices for Xen don't apply to Qubes because of how they've configured things or what features they use.

replies(2): >>36686544 #>>36687745 #
9. Syonyk ◴[] No.36686431[source]
And "anything untrusted" includes "any use of the internet."

Browser escapes are cheap enough and common enough that we've seen malware delivered through advertising networks before.

10. thoughtbag ◴[] No.36686544{3}[source]
He's been right more times that I can count. Abrasive guy for sure, but he has decided not to suffer idiots. And he does what he does for himself; we are lucky beneficiaries.

Agree wrt your arguments; it's also why I write this in a browser in a VM that is not used for anything else than this sort of thing, and periodically I will roll back to a recent snap shot with a clean browser.

(I do not use Qubes, but I do like their work.)

11. aborsy ◴[] No.36687359[source]
Browsers have built-in sandboxes, plus sometimes wrapped around stuff like snap.
replies(1): >>36687599 #
12. Syonyk ◴[] No.36687599{3}[source]
And yet...

Browser exploits are a thing, and reliably compromise systems. Apple just released a security update yesterday for "something in WebKit," and we see regular browser security updates.

The art of escaping browser sandboxes seems to exceed the art of building browser sandboxes. The Javascript JIT engine gains you a lot of attack surface, unfortunately (one of the reasons I run JITless with Javascript).

As for snaps, they're just containers - kernel separated. Unfortunately, I consider the value of that against actively malicious code to be "about zero" - local root/kernel exploits are fairly cheap. Containers (so snaps) are great for convenience - if you want to run code you trust without worrying about dependencies, this is fine. They're not fine if you want to isolate things you don't trust - such as a browser from "everything else."

Qubes gives you a much harder boundary around your VMs than containers and sandboxes do.

replies(1): >>36688100 #
13. snvzz ◴[] No.36687745{3}[source]
There's also Makatea[0], an effort to build a Qubes-like around seL4.

0. https://trustworthy.systems/projects/TS/makatea

14. snvzz ◴[] No.36687759[source]
>You still have to get through Xen to get to anything I consider of value.

It's not unthinkable, as Xen is huge, at hundreds of kLoCs. But there's an effort[0] to make a Qubes that uses seL4 in place of Xen.

0. https://trustworthy.systems/projects/TS/makatea

replies(1): >>36692243 #
15. aborsy ◴[] No.36688100{4}[source]
Snap uses AppArmor, while flatpak uses bubblewrap. You need to have a zero day in these sandboxes, in addition to in the browser. Not so easy!

But definitely VMs provide a much better boundary.

16. fsflover ◴[] No.36692243{3}[source]
Most of Xen's vulnerabilities do not affect Qubes OS: https://www.qubes-os.org/security/xsa/.
replies(1): >>36693005 #
17. snvzz ◴[] No.36693005{4}[source]
Most vulnerabilities of anything do not affect all its users.

But it's bad enough if any do. (some do affect Qubes)

It is an architectural problem.

SeL4 is a good replacement, with excellent performance and strong formal proofs.

replies(1): >>36693089 #
18. fsflover ◴[] No.36693089{5}[source]
SeL4 is great an all, but no one of those Xen vulnerabilities has led to an escape since forever, have they?