Bernhard:
By default network cards are assigned to sys-net and are not visible
in dom0 (as far as I know). Open the Qubes Manager -> sys-net -> VM
settings -> Devices tab, and make sure your network card is assigned
to it. So you need to run lsusb or lspci from within sys-net, not
dom0. You should also run `iw list`, `iwconfig`, and/or `ifconfig` in
sys-net.
Let me clarify: PCI network cards are assigned to sys-net and not
visible in dom0 by default, regardless of USB Qube. Other PCI devices
remain in dom0.
I can "see" they exist by typing lspci in dom0 (including network cards,
and the usb controller). My understanding is that while dom0 can see
them, they cannot see dom0 nor other qubes than the one they are
attached to (and dom0 will not talk to them unless a game-over event
occurred).
Looks like you're right. They still show up in dom0 lspci even when
assigned to a VM. If you use 'lspci -k', you'll see that the kernel
driver in use for assigned devices is Xen 'pciback' instead of the
actual driver.
I also think you're right that they cannot "see" dom0, in the sense that
they don't have DMA access to any memory owned by dom0 or any other VM.
On machines with working VT-d at least. On machines without VT-d, the VM
could in theory infect the device and gain access to all the machine's
physical memory. But it's still safer to have devices in their own VMs
such as sys-net and sys-usb, even on machines without VT-d.
The last part, I think you're right, as long as you don't reattach the
device to dom0. When you un-assign a device from a VM it is not
automatically reattached to dom0, as a safety feature. You shouldn't
attach it to any other VMs either, or the device could infect that VM.
You have to reboot, and then un-assign the device without starting the
VM it was assigned to. However it should be safe to re-assign devices
that support the reset command, as long as it is implemented correctly
by the hardware/firmware. I don't know if I would trust it, personally.
The recent QSB 52 fixed a vulnerability where un-assigned devices could
still carry out DMA attacks even without being reattached to dom0 by the
user. If I understand correctly.
https://www.qubes-os.org/doc/pci-devices/
https://www.qubes-os.org/doc/device-handling-security/#pci-security
https://www.qubes-os.org/news/2019/10/31/qsb-052/
You also have the option of combining
sys-net and sys-usb into the same Qube so no passthru is necessary. (Or
is that mandatory when using USB network cards and a USB Qube?)
USB is one attack surface, network another. I would suggest to keep them
apart. In fact, a USB qube does not need any networking at all (not even
internet access). Imagine its becomes victim of a "bad-usb" then it
still cannot 'break out' and phone home, for example. Actually my
Yeah, it's definitely more secure to have them separate. I think the
option is there in case you run into trouble passing a USB network card
from sys-usb to sys-net. Combining them doesn't require any USB
passthru, just PCI passthru of the USB controllers, so it's simpler and
more likely to work. That would be my guess anyway. I don't really know
how USB passthru works. Also useful for machines that don't have much
ram to spare, maybe.
sys-usb is halted by default unless I really need it (consequence: if
you plug any usb device, nothing happens. just nothing.).
Just curious, when you plug in a flash drive while your sys-usb is off,
does the flash drive's LED turn on at all for you? I noticed on one of
my machines, when USB qube is enabled (hide_all_usb), my devices aren't
recognized, and when I plug in a flash drive the LED blinks very briefly
and then turns off. The same flash drive on other OSes, or with USB qube
disabled, the LED normally stays on, and blinks when you access the
drive. (I currently don't have a Qubes machine with a working USB qube I
could try this on.)
-------------------------------------------------
This free account was provided by VFEmail.net - report spam to ab...@vfemail.net
ONLY AT VFEmail! - Use our Metadata Mitigator to keep your email out of the
NSA's hands!
$24.95 ONETIME Lifetime accounts with Privacy Features!
15GB disk! No bandwidth quotas!
Commercial and Bulk Mail Options!
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit
https://groups.google.com/d/msgid/qubes-users/f1c8a59a-7b35-0ccd-eacb-fe722878cb7a%40vfemail.net.