Virtualization AND physical isolation combined

In Rutkowska’s “Software compartmentalization vs. physical separation” article, these concepts are discussed as opposed to each other. But what if there’s some way to combine both physical and virtual isolation?
Say, qubes-laptop with whonix workstations, and qubes-router with Whonix-Gateways, connected by Ethernet LAN. In this case, even if attacker uses some hypothetical Xen\Qubes\CPU\etc vulnerability to escape from VM to host and connect to internet without tor (say, to expose your IP address and pass payload) - it would fail, because connection is torified on the separate device, which is only accessible by LAN (and, presumably, no wifi card available).

And there is such solution:

With the downside of Whonix-Gateway unable to see multiple clients, so if 2 different VMs connect to same address - connection will go though same tor-chain for both of VMs, leading to same exit node, which is correlation (exposing these VMs are using the same tor-client).
Also this example utilizes VirtualBox to run Whonix-Workstation, not Qubes. But there shouldn’t be a lot of difference in terms of connection, so maybe compatible with “qubes-laptop+qubes-router” scheme.

That’s it. Thread created for discuss of “qubes-laptop+qubes-router” implementation, also “virtualbox-laptop+qubes-router” implementation, alternative schemes with same “physical+virtual isolation” goal, and everything else related.

1 Like

Turns out, there are non-qubes instructions right in the docs: Build Documentation: Physical Isolation
Also: Connections between Whonix-Gateway ™ and Whonix-Workstation ™

1 Like
2 Likes

The cloud implementation implies dangerous high-attack-surface (Admin API) connection between
a) FDEed zone and non-FDEed zone
b) area where you can turn off RAM fast (your home) and area where RAM can be hardware or software sniffed at all times
Difference between running freerdp in dispVM is that remote server would not have to respond to Admin API requests sent by (presumably) dom0.
But cool overall and usable locally as well.
By the way, “cloud browsers” are a thing already.

1 Like

You can also read about Golem project and Trusted Code Execution on Untrusted Platforms Using Intel Sgx:

2 Likes