On Sun, Nov 23, 2014 at 02:41:10PM -0500, Jonathan Thornburg wrote:
> > I can see several possible forms of exploit-mitigation:
> > (a) use the noscript firefox extension to block javascript
> > (b) use capsicum to sandbox forefox and any plugin processes
> > (c) run firefox in a chroot jail
> > (d) have firefox talk to an Xephyr(1) instance
> >     so it's semi-isolated from the main X server
> > (e) maybe have firefox go through an ssh tunnel to localhost
> > (f) run firefox as an unpriviliged user _firefox, group _firefox, and
> >     use Unix file permissions to deny that user access to $HOME/

Well, other way could to use Qubes OS as "hypervisor" (yeah x86
virtualization) and run OpenBSD as VMs. Although OpenBSD is not para-
virtualized for Xen but Qubes OS supports Windows and they just need
to support vmchannel inter-VM communication interface.

Qubes OS exploits this interface and wrote lightweight GUI protocol
on top of that and other lightweight communication messaging.

See https://wiki.qubes-os.org/

IIUC even NetBSD doesn't have vmchannel driver ready :(

j.

Reply via email to