On Tuesday, September 27, 2016 at 9:14:51 PM UTC-4, Jeremy Rand wrote: > raahe...@gmail.com: > > On Tuesday, September 27, 2016 at 5:11:27 PM UTC-4, Jeremy Rand wrote: > >> raahe...@gmail.com: > >>> or just only allow https in the vm firewall settings. > >> > >> I assume you mean whitelisting TCP port 443? If so, be aware that while > >> this will stop most non-HTTPS traffic, there is nothing that prevents > >> other protocols from using port 443. It's a fairly well-known attack on > >> Tor's "stream isolation by port" feature for websites to use nonstandard > >> ports in order to get isolated in the wrong Tor circuit (e.g. in order > >> to deanonymize SSH traffic), which is why Tor doesn't stream-isolate by > >> port by default. > >> > >> Whitelisting TCP port 443 is still better than nothing, though, assuming > >> that you don't expect any legitimate traffic to go over other ports. > >> Just be aware that it's trivially easy to bypass for an attacker. > >> > >> Assuming that you're using a Firefox-based browser (including Tor > >> Browser), you can get some defense in depth by also enabling the feature > >> of HTTPS-Everywhere that blocks all non-TLS requests. Nothing wrong > >> with combining this with the firewall whitelist that you suggested. > >> > >> Cheers, > >> -Jeremy > > > > oh I see now there is the feature in the plugin ive never used lol. I > > still think its unescessary if you already blocking that traffic with the > > firewall, especially if that plugin or browser is compromised, especially > > with latest news about firefox plugins. For example noscript itself is > > considered a vulnerability on firefox now. > > > As I said, it gets you defense in depth because the two mechanisms > prevent different (though overlapping) attacks. > > HTTPS Everywhere's feature for blocking non-TLS requests will block > non-TLS requests from Firefox that use port 443, while the FirewallVM > won't be able to stop this. For example, a request to > http://www.nsa.gov:443/ will be stopped by HTTPS Everywhere, since it > knows the protocol being used as opposed to just the TCP port. > > The FirewallVM, on the other hand, will block TCP connections on ports > other than 443 even if Firefox in the AppVM is compromised. E.g. you > visit https://www.nsa.gov/ , they deploy a Firefox zero-day, and are > thus able to bypass HTTPS Everywhere. > > Both of these attacks have a lot of overlap (e.g. a simple request to > http://www.nsa.gov/ will be blocked by both). But each defense does > prevent some types of attack that the other doesn't, so it makes sense > IMO to use both. Definitely won't hurt you, and it might help depending > on what attacks get aimed at you. > > (Of course, either of those defenses alone is likely to prevent the vast > majority of real-world attacks, but I'd still suggest doing both. > Justified paranoia is why we're all here, right? :) ) > > Cheers, > -Jeremy
good points. Yes seems like a good idea to do both. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/95ea1c42-5f2f-477a-9314-e4460d374fb1%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.