buggy code is usually backdoored code, they are often found together.
The main problem here is documentation, there is no documentation, no list, of the packages being updated
in f32. It is very opaque.
buggy code is usually backdoored code, they are often found together.
The main problem here is documentation, there is no documentation, no list, of the packages being updated
in f32. It is very opaque.
I think you just disqualified yourself from the relevant discussion. With me, at least.
Mainly, because with
⌠you just indicated that you miss Qubes OS concept totally.
Read, create opinion, make a reference then discuss. Too late for me at least.
QubesOS has an advantage because it uses isolation of drivers into different VMs, thatâs the primary advantage, is isolation and compartmentalization, only there is no sys-disk VM. Disk read/write and encryption are a key part of a systemâs security.
The other thing is, dom0 is a highly privileged VM, we need clarity into the updates that are making it into the fedora 32 inside dom0 (which is obviously EOL, so the updates have to be applied manually).
The last part is, RHEL/Fedora is not the ideal choice for a dom0 distro because of its well documented linkes to three letter agencies.
I just got hung up on the phrase âXenâs Linux kernelâ because it sounded to me like you were saying that Xen contained Linux, rather than launching Linux as a secondary step. Though it does sound like I misunderstood the extent to which dom0 was involved in running Xenâs infrastructure.
allow me to rephrase, the dom0 linux kernel.
Note that the QubesOS development team does provide support for dom0 even after it reaches EOL upstream. Supported releases | Qubes OS
There should be an isolated VM for the disk (sys-disk)
You cannot boot a host OS without direct disk access. Even if it was magically possible, such isolation adds no security benefits. What will it protect and from what?
allow me to rephrase; the splt-dmcrypt shell script, where the encryption API is isolated, would be a better approach.
currently there is a saltstack formula for sys-audio, but none for splitting dm-crypt API into its own VM.
It is a shell script here: GitHub - rustybird/qubes-split-dm-crypt: Isolate secondary storage dm-crypt and LUKS1 header processing to Qubes DisposableVMs
but there is no saltstack formula.
what Iâm suggesting is that there be a saltstack formula for split-dm-crypt
Previously you said:
There should be an isolated VM for the disk (sys-disk) and also audio drivers (sys-audio) so that
you can get some isolation for the disk and audio drivers.
This talks about isolating the driver (the entity handling low-level communication with the hardware, e.g. SATA or NVMe) from dom0. Domains like sys-audio and sys-gui aim to decouple hardware from dom0 to reduce the attack surface of the host.
allow me to rephrase; the splt-dmcrypt shell script, where the encryption API is isolated, would be a better approach.
That is a different thing. AFAICS, qubes-split-dm-crypt aims to isolate the decryption mechanism (not the hardware) from a potentially malicious destination VM (not dom0) for the purpose of improving encryption key confidentiality. There is no point to hide secrets from dom0.
Moderation note: @janglingquo_575 unless youâre willing to back your claims with facts, abstain from incendiary statements like this in the future. FUD is not welcome in this forum.
So the hardware driver for read/write to/from disk still resides in dom0, but the encrypt/decrypt (dm-crypt)
package is isolated in a VM?
Apart from SELinux itself being developed by NSA (which does not automatically mean it is malicious but it is a link), Red Hat also confirms:
âRed Hat partners with state and local agencies to deliver value with open source solutions.â
âRed Hat has the open source technology and expertise to partner with the DoDâŚâ
So whatâs the actual benefit of isolating the encrypt/decrypt (dm-crypt) into its own VM? Does it have to do with sourcing entropy?
Does Qubes utilize SELinux? Can it be configured? Is there a performance hit from the additional logic?
That is explained on the link you shared.
Yes, in 4.2.
I donât know.
A little.
A link to a three-letter agency doesnât have to imply a danger in case of free software. Otherwise you should not use Tor as well.
This decision was reverted later.
There is a related discussion here about Debian. In it, I tried to use the same argument about the proprietary blobs, but didnât convince anybody. Surprisingly, even @marmarek
doesnât see any danger in it. Perhaps itâs a small danger, less important than many other attack vectors on Qubes, but I fail to see why it should be completely denied.
I donât see any firmware installed in debian-12-minimal.
In Fedora 37 minimal dnf list --installed | grep firm
returns nothing too.
After upgrading to 4.2.0, I notice that individual firmware packages are no longer dependent on each other (although linux-firmware is not granular at all), so uninstalling some of them works.
However, the qubes-dist-upgrade
installed 45 new packages as âweak dependenciesâ (not required by any other package), among which:
repoquery -q --installed --whatrequires pinentry
)Additionally, curl
got installed because rpm-0:4.18.2-1.fc37.x86_64 requires it.
IMO, this is moving from bad to worse and goes against all the talk about minimalism as a security measure.
New finding:
Running dnf autoremove
in dom0 shows 100 packages (323M).
From man dnf
:
dnf [options] autoremove
Removes all "leaf" packages from the system that were originally installed as
dependencies of user-installed packages, but which are no longer required by
any such package.