On Fri, Dec 23, 2016 at 6:04 PM, Nicklaus McClendon <nickl...@kulinacs.com> wrote: > I'm intrigued. How is qrexec utilized?
Something which I have not set up yet, but intend to soon, is a split email server model, where the MTA and MDA are in separate VMs, and incoming mail is delivered over qrexec. This would have the property that an exploited SMTP server would not have any access to already-delivered mails (assuming residual message contents are not left hanging around in memory too long). Furthermore, I could have multiple separate mail-sink VMs (with local mail storage and IMAP servers), which are connected to separately via different instances of my mail client on my Qubes laptop. This means I could heuristically filter my mail based on assumed purpose (for example, mail to a qubes mailing list go to one VM, mail from my bank goes to another, etc.). This means a compromised mail client on my Qubes laptop would be restricted to only the mail that domain is expected to have, and pivoting from that compromised client to compromising my IMAP server would not be sufficient to obtain the mail from a different domain. Additionally, the usual mail pipeline suspects like spamassasin, clamav, etc. could be run in a DispVM per message (a super heavyweight solution to be sure, but should not matter for personal mail workloads on my own server). > If you can't access dom0, qrexec is default allowed, Uhh.... What? Can you elaborate? As far as I understand and can verify, this is not the case: [user@dom0 ~]$ /usr/lib/qubes/qrexec-policy --just-evaluate 56 disp8 disp9 qubes.Filecopy foo [user@dom0 ~]$ echo $? 0 [user@dom0 ~]$ DISPLAY= /usr/lib/qubes/qrexec-policy --just-evaluate 56 disp8 disp9 qubes.Filecopy foo qrexec-policy: cannot connect to X server [user@dom0 ~]$ echo $? 1 > which removes the added security of it. Definitely not entirely. > If you're remotely accessing dom0, you're adding the networking stack to the > TCB, Not necessarily. At least your NIC need not be trusted, potentially more. > and once again have a basic Xen installation with extra unnecessary overhead. ... and if overhead is your primary concern, why even bother with Xen at all? Why not use containers or such. > qrexec with a networked dom0 doesn't seem anymore secure than using SSH to > run remote scripts between networked VMs. Assuming you mean SSH between the VMs, I'm not sure I agree. Networking has a much larger attack surface, and you are relying on crypto with keys that can be stolen rather than vchan where the authenticity of source and dest and integrity of msg contents are already trusted. OTOH, OpenSSH has a pretty stellar track record and has likely received more scrutiny than vchan (which I have not audited myself yet either), so I can certainly understand the contrary argument too. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/CABQWM_B8-NH1Da3S%2BLu0bhAZhp_vnUNsL-bLK_A2HHOaUykFzw%40mail.gmail.com. For more options, visit https://groups.google.com/d/optout.