-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 On Thu, May 30, 2024 at 05:20:04PM -0000, qubist wrote: > On Wed, 29 May 2024 14:51:36 -0400 Demi Marie Obenour wrote: > > > Qubes OS only knows how to manage Xen interfaces. It does not (and, > > realistically, cannot) know how to manage every kind of network > > interface imaginable. > > In such case, it cannot do this too: > > > [...] the network interface must not be brought up at all, to prevent > > a spoofing vulnerability. > > as it is not up to Qubes to do it, right?
Correct. > Or how will it bring an interface up/down if it cannot control it? > > As for sys-net and its self-managed (uplink) interfaces: this means any > such interface can have its group changed, thus circumvent the > group-based antispoofing chain you suggest. Actually, sys-net can > simply 'sudo nft flush ruleset' which is extremely easy with default > passwordless root, so does it really matter what firewall rules we > attempt to enforce? > I don't know if I am overthinking it, but for all that to work > properly, an external control mechanism is necessary (another qube). I > don't know if there is ARP antispoofing mechanism either. > > I hope you can clarify. Qubes OS's current firewall treats any interface in group 2 as if it were a Xen vif* interface, and prevents downstream spoofing by any interface _not_ in group 2. Common network management packages assign all devices to group 0 by default, so this works fine. Being able to assign non-managed devices to group 2 is intentional, not a bug. - -- Sincerely, Demi Marie Obenour (she/her/hers) Invisible Things Lab -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEdodNnxM2uiJZBxxxsoi1X/+cIsEFAmZYygkACgkQsoi1X/+c IsGSSw/+P7nD30ot5cHsZPgKz5DR6+zX+YYTMjZm1k5hC3sCOKM7AmyyaIxCk4OV /79JA1OOu/J0IC7vzlrc3o92Ix0/3segH4Ag6XbtCnLAxgJX8K6t5wgg3ySCxmMt mIRlhUXCTL3t36H7l2wjpLGcq4iMqOUw0mcdudmgEW0YwDkR7GoI1sOZfr4f/kle QQlnLkvjHojL/Fhit41XyQCwEarHlAVXAZ3ACWMlzBwfwxaaXQ4KM4QZTUnEkRDM MX6zriV8cOnv5ZnQFgBZ04u7UfQJN/XvpCnp9CKqAJDg9j1QDQiBnUL4rgoqJgDr vzBysAAgdReB4WoTnHV5DWfnp4GiQgI+Vx4NXOOqMS5LIyIG2cMMkoZVBRP00CWy 0q0ToCHQCpsReQo0xzUvNPnYJPBoSrTmi5JJai4r3Gd9g+W7jKtJ/yrPAJ+VLRMY cKSRQ8q2rUJhCiwbvqsZHa71o+LOYPQapJ0fvpd45HNJI6WgIVTMpIfspkaVVanM qDLDyxLIkmWABtWjrMjFaaSb7KlTii7RaM+9wPH6VFlUkYrPADzb7O0+a92xVODj ezrsgzafQyphacv+rdzIMQJt+msLKYhismuv/75RSndFoGBXT80T1qi3fyYqlSZT Gk+vMrN0hgdM7OYHzLsaTDo4fduEA48L9LNbT9fJHKhjsLoamBo= =kHQG -----END PGP SIGNATURE----- -- You received this message because you are subscribed to the Google Groups "qubes-devel" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-devel+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-devel/ZljKCTrG1RvlqYCs%40itl-email.