Re: [qubes-devel] Re: Password encryption for individual vm's

2019-10-22 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Tue, Oct 22, 2019 at 05:59:00AM +, bo0od wrote: > John Smiley: > > On Fri, Oct 18, 2019 at 9:27 PM Josh Skipper wrote: > >> While I was looking for a way to individually encrypt VMs with a unique > >> password, I stumbled upon this thread. >

Re: [qubes-devel] Re: Password encryption for individual vm's

2019-10-21 Thread bo0od
I think its a good idea for e.g like: - Multiple PC users, each user want to use the PC but not each user want to give permissions to view all vms - If by any how someone knew the passphrase for the Qubes and opened it , at least he cant damage all vms because some (which are the important i

Re: [qubes-devel] Re: Password encryption for individual vm's

2019-10-21 Thread John Smiley
Is a long, correctly generated (with actual dice using paper and pencil - no electronic copies ever) Diceware password entered at boot-time not sufficient? If not, why not? On Fri, Oct 18, 2019 at 9:27 PM Josh Skipper wrote: > >> I'd just like to remind people (again) that Qubes has a storage

Re: [qubes-devel] Re: Password encryption for individual vm's

2019-10-18 Thread Josh Skipper
> > > I'd just like to remind people (again) that Qubes has a storage pool > feature. So it IS possible to encrypt VMs with different encryption > keys. It requires some initiative from the user to set it up, however, > to define the pools so they reside in encrypted volumes. > While I was

Re: [qubes-devel] Re: Password encryption for individual vm's

2019-01-21 Thread thorsten . schierer
> Then attach the encrypted containers to disposable VMs only. Problem 100% > solved. Sadly it's not. When you start working with files from these containers, data will eventually be written to harddrive "unencrypted" (let it be swap, temporary files, persistent work related files, ...). Once

Re: [qubes-devel] Re: Password encryption for individual vm's

2019-01-21 Thread 'Raffaele Florio' via qubes-devel
> Giving the user a way to additionaly encrypt some higher value VMs does not > change anything for any user that doesn't use this feature at all. You can > use it but you don't have to! > Sorry, what I meant isn't clear. Nonetheless the point is cleared subsequently in my previous post. I

Re: [qubes-devel] Re: Password encryption for individual vm's

2019-01-20 Thread David Hobach
On 1/20/19 9:01 PM, thorsten.schie...@gmail.com wrote: Or just encrypt all your customer A data inside a container or partition in dom0 and attach that to the right VM on demand whilst memorizing the respective password. Something like this could work if you are using the container as a simple

Re: [qubes-devel] Re: Password encryption for individual vm's

2019-01-20 Thread thorsten . schierer
> Or just encrypt all your customer A data inside a container or partition > in dom0 and attach that to the right VM on demand whilst memorizing the > respective password. Something like this could work if you are using the container as a simple data storage. Unfortunately once you start

Re: [qubes-devel] Re: Password encryption for individual vm's

2019-01-20 Thread 'Raffaele Florio' via qubes-devel
I'm asking apples, and you're giving me oranges. I'll explain again in what my idea is, and why I think that this naive approach is bad. As premises you should remember that you're proposing this feature in Qubes OS, a security oriented OS. Furthermore you aren't the only user of this OS, so

Re: [qubes-devel] Re: Password encryption for individual vm's

2019-01-20 Thread David Hobach
On 1/20/19 12:33 AM, Andrew David Wong wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 18/01/2019 11.43 PM, thorsten.schie...@gmail.com wrote: I am also interested in having encrypted vms (preferably having one password for each VM-group). Let's assume I have one or more VMs for

Re: [qubes-devel] Re: Password encryption for individual vm's

2019-01-19 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 18/01/2019 11.43 PM, thorsten.schie...@gmail.com wrote: > I am also interested in having encrypted vms (preferably having one password > for each VM-group). > Let's assume I have one or more VMs for each customer which contain sensitive > data

Re: [qubes-devel] Re: Password encryption for individual vm's

2019-01-19 Thread Brendan Hoar
On Saturday, January 19, 2019 at 4:06:31 PM UTC-5, thorsten...@gmail.com wrote: > And that's exactly what I want to make sure can not happen in Qubes. Even in > the worst case scenarios with HDD, filesystem, etc. it must not be possible > that data from VM1 ends up in VM2, even if it's just

Re: [qubes-devel] Re: Password encryption for individual vm's

2019-01-19 Thread thorsten . schierer
> As I said I understand your point. However I think that *this* approach is > too risky because it gives a false sense of security. > Because it could create bad habits. Qubes doesn't really enforce any secure > scheme. IMO habits are created by persons so everyone is responsible for their own

Re: [qubes-devel] Re: Password encryption for individual vm's

2019-01-19 Thread 'Raffaele Florio' via qubes-devel
> Yes, of course you have to consider the notebook compromised at this point > and needs to be reset to a clean state afterwards. But that's another topic, > It's all about minimizing the damage done here. If the VM groups are > encrypted individually, at least you can have some peace of mind

Re: [qubes-devel] Re: Password encryption for individual vm's

2019-01-19 Thread thorsten . schierer
> After you forgot the notebook, will you restore to a clean state (like using > paranoid mode, at least)? Because you are worried I think so. And this should > be done everytime the notebook is left unattended. You know, compromised Dom0 > = game over. Yes, of course you have to consider the

Re: [qubes-devel] Re: Password encryption for individual vm's

2019-01-19 Thread 'Raffaele Florio' via qubes-devel
> Idea proposal: > > === > > During writing I had an idea. An improved way to handle such use case could > be the concept of PC (OS or Qubes) state (I hadn't time to find a suitable > name, lol). I mean: when you are in a state only a subset of VMs are present, > the other ones are

Re: [qubes-devel] Re: Password encryption for individual vm's

2019-01-19 Thread 'Raffaele Florio' via qubes-devel
> - In the rare case I forget to lock my notebook at cusomer 1 I don't want > anyone to be able to extract other customers data. (While not perfect in > regards to dom0 security at least it makes sure no data can be stolen) > After you forgot the notebook, will you restore to a clean state

[qubes-devel] Re: Password encryption for individual vm's

2019-01-18 Thread thorsten . schierer
I am also interested in having encrypted vms (preferably having one password for each VM-group). Let's assume I have one or more VMs for each customer which contain sensitive data that must not leak anywhere. While working for customer 1 I want to make sure that only VMs for customer 1 are