I have a standalone vm named research-work. It uses fedora 37. I already have disk encryption and dom0 user authentication setup.
But I want to have a third authentication on my model for research-work vm. Preferably with encryption of some kind. I have no trust in the screen locker.
What is the my best option in terms of stability and speed?
While I’m thankful for your response, my scenario is different,
Imagine that I’m logged into my personal VM, doing some personal browsing at a library. I lock the laptop and walk towards a shelf to grab a book. The screen locker doesn’t encrypt the disk. So a dedicated attacker, in my case it would be a private investigator hired by some high profile politician I’m doing research on, he could snatch my laptop and use skilled individuals to bypass the screen lock.
The same could happen due to a direct snatching while I’m doing personal browsing, I use qubes for personal and work. I don’t want my research-work VM to be compromised. Data at rest in my case needs to be encrypted.
Could you explain in what way your scenario is different?
If I remember that thread dealt with exactly the scenario you outline,
and proposed some solutions.
Different in the way that my research-work VM is vulnerable because of my use of personal-vm. Not because of my use of research-work. Simply because qube os’s disk is decrypted.
If I’m not wrong, the thread suggests a per-vm Luks encryption?
No, it’s the same - that thread explores ways to encrypt a qube. If you
are using it the qube data will be decrypted. If you are not, it will be
encrypted on the decrypted Qubes system.
One solution.
Dont ignore the value in securing your data where possible in every
qube. You dont need to have “encrypted qubes” to get this significant
increase in security.
(If you are concerned with forensic analysis consider issues on
encrypted volatile volumes and swap, and running qubes processing your
research-work data in ramdisk based qubes.)
That’s the point. I’m not using research-work qube. I’m using personal vm qube and dom0 by extension. Research-work is at rest and is not running.
I think we are talking past each other.
Whatever solution you choose to use to secure the data in Research-work
will work.
Can you explain in what circumstances Research-work would not be protected
if personal is running and you have used an encrypted pool?
Equally, if you have encrypted the data in Research-work, in what
circumstances would it not be protected when you are using personal?
Note that encrypting the data has the advantage that you have a far more
granular solution. You could still be running Research-work but the data
would be protected: you could be accessing “generic data” in Research-work
while “specific data” was still encrypted.
Of course, depending on where you are and what threats you are
considering, all this might just be theatre. Do not under estimate the
importance of an informed threat analysis.
I never presume to speak for the Qubes team.
When I comment in the Forum or in the mailing lists I speak for myself.
I understand. I’ll clarify. I’m looking to have not only the specific data protected but also generic data as that would link me to the research work.
I didn’t try, but you could use LVM to create a disk encrypted with LUKS. Unlock it on your dom0, use qvm-block to attach it to your AppVM, run the AppVm and work on it.
If you need to get away, close the VM, close the LUKS volume.