On 2019-01-19 13:46, Illidan Pornrage wrote:
> On 1/18/19 5:02 PM, Goldi wrote:
>> -------- Original Message --------
>> From: goldsm...@riseup.net
>> Sent: January 18, 2019 3:45:06 PM UTC
>> To: unman <un...@thirdeyesecurity.org>
>> Subject: Re: [qubes-users] Mirage-Firewall - Trusted in Dom0?
>> On 2019-01-18 13:52, unman wrote:
>>> On Fri, Jan 18, 2019 at 04:38:56AM -0800, goldsm...@riseup.net wrote:
>>>> On 2019-01-15 15:19, Goldi wrote:
>>>>> I've been happily using Qubes for several years and noticed that
>>>>> several prominent members of the Qubes Team have in the past suggested
>>>>> installing Mirage-Firewall as an alternative to Sys-Firewall. However,
>>>>> I cannot find any reference to MF in the Qubes Docs.
>>>>> I'd like to install Mirage-Firewall, but I have a nagging doubt about
>>>>> whether the code can be trusted. Particularly as it has to been
>>>>> installed in Dom0
>>>>> What do you guys recommend? Can the MF developer be trusted?
>>>>> https://groups.google.com/d/msgid/qubes-users/21F0DB51-AF5A-4729-8708-14C54BB4C29A%40riseup.net?utm_medium=email&utm_source=footer
>>>> In Nov 2018 a prominent member of the Qubes team; Unman suggested using
>>>> Mirage-Firewall.
>>>> I'd appreciate very much a reply to my earlier query about the integrity
>>>> and reliability of the code/developer of Mirage Firewall
>>> There is a reference in the docs to GSOC potential work: otherwise
>>> you'll find discussions here and in qubes-devel, and there's an open
>>> issue in qubes-issues.
>>> I have no view on the integrity of Thomas - don't know him. His
>>> contributions have been good and he's always seemed helpful and to know
>>> what he's talking about.
>>> You can look at the code yourself and come to view on that: it's
>>> pretty straightforward.
>>> https://github.com/talex5/qubes-mirage-firewall
>>> I've done some testing, and the firewall works as expected, with no
>>> strange effects I could see.
>> Thank you for responding.
>> I think I'll pass on installing Mirage-Firewall. I'm a user and
>> regretfully not competent to review MF code. I had hoped that any
>> recommendation to install anything in Dom0 would have been first
>> thoroughly assessed by the qubes team. After all, if Dom0 is compromised
>> its as Joanna used to say "game over"
> Ok, a short update for you. I am interested in it too and currently
> reviewing it.
> The qubes mirage firewall is a kernel binary that is just stored in
> dom0 (+ initramfs and modules storage image), not executed in dom0.
> (The initramfs is usually the first program started by a linux kernel.
> The modules.img is an image that is available as volume in the qube to
> pull extra modules for a linux kernel from. As this is a mirage
> unikernel and not a linux kernel the modules.img is empty. The
> initramfs contains a part of the firewall.)
> It can then be chosen in qubes settings > advanced > kernel, per qube.
> This is just a kernel only without extra os that is run in the firewall qube.
> Risks:
> - If whatever puts the kernel into a qube to boot from it can be
> exploited using a malformed kernel file <-- imo low risk but no
> guarantee as I havent reviewed that part of the hypervisor code.
> - The installer is corrupted and puts evil things in the rpm for dom0
> <-- from the github it isnt even an rpm, just a tarball that gets spit
> out by the builder or downloaded as release from github. So great
> transparence.
> - The firewall being leaky because of bugs or maliciously or the build
> script being manipulated maliciously. <-- It is built in a docker
> container. The github repo contains the dockerfile which actually
> verifies its base image using sha256, the maintainer seems to care
> about reproducibility. Mirage libraries get fetched via the opam OCAML
> file manager. Which might check signatures on those. Up to
> verification.
> All in all pretty safe to use.

Wow. That's a good comprehensive reply. Thank you.

It goes a long way to convincing me that the code is safe to use.

Does any one else have any feedback on this issue?

You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
For more options, visit https://groups.google.com/d/optout.

Reply via email to