On 9/3/20 12:44 AM, 'Ryan Tate' via qubes-users wrote:
I've started making special templateVMs where I install less trusted software, typically closed source binaries or code distributed directly from a vendor.

I am curious if others do this and if people think it adds much security wise.

For example, in addition to vanilla fedora-32, where I will install any number of packages from the standard repos, I have -

fedora-32-zoom (the proprietary videoconferencing software)

fedora-32-slack (the group chat app, installed from their own rpm)

fedora-32-print (had to run a Brother install tool to get printer working, use it from my dvm-print wich is firewalled only to my local printer ips)

fedora-32-media (has some proprietary media hnadling software)

I just don't like the idea of putting untrusted code in a templateVM used by sensitive VMs. On the other hand, perhaps I worry too much, in theory at least I do control when any given app is run? The Brother install was a bash script run via sudo (!!) that could have done anything but the others typically go in as rpm files via dnf, so presumably (?) they can't just install untrusted services that get auto launched.

Obviously this makes updates take longer, so it's got some cost.

Is this a wise approach? Or no? Thanks for any thoughts....

          Ryan


Hi Ryan,

I do very similar things. I have a debian-media and a couple of other
specialised templates.  Also, I have a Skype standalone VM as I didn't
want a whole template just for Skype.

I had to give up on my zoom standalone VM because my usb camera was
very flakey when attached via sys-usb.  Works OK with skype, but
not zoom!?!

Mike

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c435d0d3-76c0-fd06-6cc4-a4006a17fad8%40keehan.net.

Reply via email to