On 8/10/19 5:12 AM, 799 wrote:
Hello,

Jon deps <[email protected] <mailto:[email protected]>> schrieb am Mi., 3. Juli 2019, 22:30:

    am curious if anyone actually does this , and how or would it make
    any sense instead to use a static sys-firewall ,  if I
    just have the default  sys-firewall  (which might be easier because
    there would not be a need for the PCI  setup  ?each time)


What would be the better choice regarding attack surface:
  disposable netvm+firewallvm vs. mirage-firewall?
If I understand it right the mirage firewall has no/less option to be compromised. I am using the mirage fw and are only using a fedora-30-minimal based sys-firewall to get dom0-updates, which can't be done via the mirage firewall.

But I'll also change this firewall to a static disposable FW.

Question:
Afaik the problem when using a static disposable sys-net VM is, that I need to enter my Wifi Credentials each time, as the VM will be unable to remember them.
Is there any way tweaking this behaviour?

To get a similar result, adding Qubes-VM-hardening to your template would sanitize sys-net on each boot while retaining your wifi connection passwords. After installing, all you have to do is enable 'vm-boot-protect-root' Qubes service for the sys-net VM. By default, the contents of /home are retained, but you can change that by also enabling 'vm-boot-tag-qhome' which sets up a quarantine on /home.

(You can also use it to do minor per-vm customizations at startup, which allows more re-use of a template instead of having to make clones.)

The result isn't quite as secure as using a DispVM, because the Ext4 filesystem itself could (theoretically) be exploited. But I think it raises the bar quite a bit.

https://github.com/tasket/Qubes-VM-hardening

--

Chris Laprise, [email protected]
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5fc9440a-5d09-c043-26a5-6290befe7729%40posteo.net.

Reply via email to