On Fri, Feb 28, 2020 at 06:00:04PM -0600, Sven Semmler wrote:

> You want your sys-firewall to be separate from sys-net for the same
> reason: compartmentalization. 

as usual "depends on your threat model".

if you are into outbound-firewalling of appvms, not doing so in the
appvm makes a lot of sense for the reasons you stated. 
but you could do that in sys-net too, entirely without sys-firewall.

unless your threat model involves the same (or cooperating) attackers
compromising your sys-net from the outside that want to break out of
your appvm...


> I hope others will correct me if I got anything wrong.

looks good to me.
but i would like to add some off-default-config considerations/rambling.

what if your attacker has some l2-ish network linux exploit?
lets take something like CVE-2018-15688 as an example.
ipv6 dhcp problem, in both systemd and networkmanager.

afaik no one ever really evaluated the impact on a qubes system.
because ipv6 is "disabled" in the default config. 
but what does that mean?
"ipv6 disabled in qubes" means ipv6 is disabled _within_ qubes.
as in, it is actualy enabled (by default) in sys-net in some ways,
just not forwarding it on the qubes-internal network links.

so worst case, an attacker can compromise your sys-net, then compromise
your sys-firewall, then your appvm. all with the same exploit, just
having to go hop-by-hop.

one way to mitigate a scenario like that is to involve something that
is _very_ much not linux. like qubes-mirage-firewall. or a bsd fw.
which of course is a "threat model" and "subjective considerations" thing.

because one side of it is ... it makes it much more unlikely for a 
single attacker to have a walkthrough with a single exploit.
== it makes it less likely for an attacker to compromise the whole chain. 

otoh ... now there are two ip stacks involved, and the mirage one
certainly got a lot less eyeballing than the linux one.
== it makes it more likely for an attacker to compromise part of your chain.

and there are "env" factors to consider too.
sure, if you dont have the ram to run separate linux based firewall vms,
go ahead and dump all of it (inkl sys-usb) into sys-net. 
or your HW doesnt have (usable) IOMMU and you run your sys-net/sys-usb
pci-vms as "pv" instead of "hvm". 
your overall security posture will (probably) still be better than with
a plain linux (or anything else) system, even though you take some 
shortcuts that are not default config or recommended.

qubes provides a lot of different options there, with a reasonable
default config, but (depending on your threat model) going beyond
that can be quite reasonable too.



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200229004951.GH8973%40priv-mua.

Reply via email to