IMO, this is a bit insane for a “typical” (non-honeypot) computing scenario; at a minimum how is sys-firewall
not in there?
Something like:
sys-net
→ sys-firewall
→ sys-vpn1
→ sys-vpn1
→ sys-whonix
Or, something like:
sys-net
→ sys-ips
→ sys-firewall
→ sys-ids
→ sys-vpn1
→ sys-vpn1
→ sys-whonix
Architecture for a honeypot might look like this:
sys-net
→ sys-vpn1
→ sys-vpn1
→ sys-whonix
Do you realize how this architecture design impacts your security “goals”? Unless you’ve rebuilt a custom sys-net
, sys-net
has been built using the default, full/desktop of either debian or fedora and is connected to your LAN uplink (no idea what protection this may or may not provide) which, seems to be the case for many happy Qubes users. However, when you couple this with the architecture you used, you potentially open easily avoidable attack vectors.
Hypothetically:
Let’s say you’re browsing the dodgiest of dodgy sites (because you’re using tor
and that’s all it’s good for
) and somehow, someway, some type of RCE or client-side + LPE exploit-chain exists in any of the applications/services which you are using/may be running/connecting via with a full distro …
With this an adversary may want to begin running a service of their own on port 31337 on your node. At a minimum, this service would be easily accessible from you LAN (the network your sys-net
connects to as an uplink). Should your adversary be of “boogie man” status and, they were able to traverse sys-whonix
→ sys-vpn2
→ sys-vpn1
, how LOVELY of you to have “left the door open”!
Whereas, even adding sys-firewall
(simple L3) with default deny rule implemented would at a minimum protect you from an attacker on your LAN accessing the listener on port 31337. That said, NOTHING is “safe”, until you make it so to your standard.
Example:
Even users who chose to create/use a sys-pihole
, would have had to defend agaist vulns like this:
It could, should it be applied as the NetVM Qubes-wide but, this was not the intent of my suggestion. In it’s default configuration you’d lose the fine-grained traffic control/identification which OpenSnitch provides and you’re seeking. I made some progress with a “proper” sys-OpenSnitch
but, it’s nowhere ready for prime-time. Besides, nobody tests/uses any of my other salt stuff. 
To be clear, you would want to identify any abnormal traffic flowing in/out of you questionable hosts. To do this, you would want to install the quasi-L7 OpenSnitch firewall directly to the host. Yes, writing to this system is forensically unsound so, if you plan to perform forensics on the disc, be sure to make forensically sound backup of the system/disc in question.
What’s a “security hold”?