Re: [qubes-users] Re: Kicking the sudoers dead horse

2017-03-14 Thread haaber
Unman wrote:
> (You can configure the mime and default associations to use
> qvm-open-in-dvm, so you can double click on a file and it will
> automatically open disposableVM and display it there.) If you ensure the
> disposableVM is spawned offline there is (almost) no chance of data being
> exfiltrated.
Very nice & seducing construction.
Is that easy to set up mime-types in a graphic mail client like icedove
or do you use mutt/pine for this? I would be interested to know how to
do ensure a link sent by mail be opened in a disp-vm ...

Cheers, Bernhard

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/627f7ffd-53b1-490f-83ed-8d0dd3fa7ed5%40web.de.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Kicking the sudoers dead horse

2017-03-14 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2017-03-13 16:00, Unman wrote:
> On Mon, Mar 13, 2017 at 11:50:59AM -0700, hib0...@gmail.com wrote:
 
 Four, I am aware of disposable VMs but for a working desktop
 these are of marginal use outside experimentation, malware
 testing, untrusted web browsing, etc.  They are not practical
 for a work environment where you need persistent
 configurations, caches, etc. Perhaps this would indicate
 QubeOS is just not intended or currently a good candidate for
 such an environment if their use is the expectation which is
 not how I understood its overall intent.
>>> 
>>> You should read the thread more carefully. You are simply wrong
>>> about this. Again, more experience in working with qubes may
>>> change your mind. I have set up working desktops for many users
>>> where all the heavy lifting is performed in disposableVMs, and
>>> the persistent qubes are used only for storage. Look at
>>> something like Bromium, which uses the equivalent of 
>>> disposableVMs in a working desktop. It's a viable model and
>>> works right now.
>>> 
>> 
>> I do need to look at how this would work for my scenario more
>> deeply as its admittedly a paradigm shift but the practicality of
>> maintenance of so many DispVMs seems overwhelming to me and the
>> value of that overhead questionable.
>> 
> 
> The beauty of it is that there isn't maintenance of many dispVMs -
> you can do almost everything with ONE DVMTemplate.
> 
> Let's take a concrete example: You run a storage qube based on a
> minimal template - if you insist put in a basic file manager. 
> Configure a DVMTemplate with pdf viewer, libreoffice, image
> viewers, vlc, anything you like. Browse the web in a disposableVM -
> save any files you want and qvm-copy them to the storage qube. Now
> it doesn't matter if you have backdoored files, malware, or what.
> It doesn't matter because it will never be RUN in the storage
> qube. (You can configure the mime and default associations to use 
> qvm-open-in-dvm, so you can double click on a file and it will 
> automatically open disposableVM and display it there.) If you
> ensure the disposableVM is spawned offline there is (almost) no
> chance of data being exfiltrated. That seems like a valuable result
> to be gained from configuration of a single file - mailcap, mime
> type - and there's almost no overhead.
> 

I'm still struggling to see significant security value in this setup
that can't instead be gained through careful compartmentalization in
normal AppVMs without the significant effort, expertise, and costs
required to script and use the DispVM setup. (See my reply to
7v5w7go9ub0o for details.)

Would you mind explaining what the specific benefits of this setup are
(over and above careful compartmentalization in normal AppVMs) and why
they outweigh all the costs?

> Most users who have this sort of set-up don't find anything to 
> comment on - I think they see the "starting dispVM message" just
> as another splash screen. That's just anecdotal evidence, I
> know,but it's my experience. Even the start up speed doesn't seem
> outrageous.
> 
> Two things to get used to are NOT saving under a new name in the 
> DisposableVM, and having to create a new document in the qube
> before it can be edited in the disposableVM. I've got round this by
> a simple script associated with a Menu Item that prompts for the
> file name, creates an empty file with that name, and opens THAT in
> a disposable VM for editing.
> 

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-

iQIcBAEBCgAGBQJYx5H4AAoJENtN07w5UDAwCbYP/jl+njqDMSRsfIW2PKY2LfWw
b/tZ+mrMV/C5QMK/rGp8xOFrufXptgD3r0qVUISKPbDy4GV1FQa+kekmsdrL/k3b
Gqi4epjC0WHpAfwnIygQ6SSeN6NGzb2Js31Hha589QC14XPst9/DW7Qr8YFK3/tK
UFZQjIfZrwVTqFkh3zkNg7RhvlkNLZkIcrCwNGk4dC17rvtmNrMIJa56yR0qw8h8
R6u4VcgDjMNX6GYdtzhFUvUCjB7AulYjnNVilPYUbpG7Qkt1qSwywH/r/WicyY96
xk6vhLU4hwOSuZpC7piRO931/sBndfCqFb3zYfFgwfRe5zch9o/5x2K03dvuPYRH
LwSFybikZ3d2to+NKuzVm5lXww9f4uhurqZxx3+WwJyWPdblrOGK4kmz6HQUolKQ
NzrPtiVxBN+a36gd+6xIvwrLZnVXYfAdNqJC90FbReW1swK37CXgiqllUla3S5Km
844r1v9/gNaE4f0fvQ2wcOhqFO90G2P4fbK8Eej/3ahmgZiUZ3idAoNp/RKHle/H
ZTzrmJT2Jl3Q5clIpXDFrQ87RKOhpjzP/qp9wZuHdt2g6UueTMaHLytpWwBwjKGb
r2LpM8Vpc0UhtoGfHmOL8ZaEO2FEKexb3lTwj8/Gn6v+oP3/yU9jNwpsjWh2fEYZ
LRDXdBzUa6+BhmVMzp9Y
=p4u0
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8c7a8b22-f739-3997-cfa6-84f43abdd324%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Kicking the sudoers dead horse

2017-03-14 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2017-03-13 10:37, Unman wrote:
> On Mon, Mar 13, 2017 at 08:13:31AM -0700, hib0...@gmail.com wrote:
>> I only skimmed the thread so I apologize for my laziness up
>> front if I missed something but I think a few clarifications need
>> to be made about my experiences thus far. The following
>> statements are with reference to the fedora-24 template which was
>> downloaded 05/10/17.
> 
> It's a shame you've only skimmed the thread you kicked off, because
>  there is a good deal of interesting information there, and many 
> interesting perspectives.
> 

I agree. Kicking off a discussion thread, then sending very verbose
replies without really reading the thread to which you're replying sends
a certain kind of message, something like: "What I have to say is more
important than what you have say. Therefore, it makes sense for me to
spend little time reading what you have to say and instead spending more
time writing what I have to say." Sometimes, this is right. For example,
if one is a leading expert in a certain field, it might make more sense
for that person to focus on disseminating his or her knowledge. But
that's generally a position that has to be earned first.

> Over at qubes-issues, Joanna commented on the dom0 control, (NOT as
>  password as Chris rightly stressed,  but a mechanism in dom0 for 
> requiring user acknowledgement before granting root rights in a 
> qube:
> 
> "I'd worry more about sending a false-sense-of-security signal that
>  (presumably) Dom0 is able to strictly control user -> root 
> escalations within VMs (which it really cannot 100% as explained
> in the linked page)."
> 
> Of course, hers is just another voice, but it's one worth
> listening to.
> 

In the sense that we should not blindly accept arguments from authority,
I agree. However, in every other sense, I disagree. Regardless of
whether one shares Joanna's opinions, one must admit the facts: Joanna
founded Qubes, she sets the road map for Qubes, and she controls the
Qubes Master Signing Key. In this sense, hers is clearly not "just
another voice," but a very special one.

> [...]
> 
> Look at something like Bromium, which uses the equivalent of 
> disposableVMs in a working desktop. It's a viable model and works 
> right now.
> 

I think we should be very careful with such comparisons to Bromium, lest
we start giving people the wrong idea. Bromium "micro VMs" are
definitely not the equivalent of Qubes DispVMs. (Perhaps the most
fundamental difference is that Bromium itself has to run on top of
Windows.)

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=y1uh
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/47e296e8-09fd-d2cd-027a-f42331ea8b32%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Kicking the sudoers dead horse

2017-03-13 Thread hib0x13
On Monday, March 13, 2017 at 5:00:22 PM UTC-6, Unman wrote:
> On Mon, Mar 13, 2017 at 11:50:59AM -0700, hib...@gmail.com wrote:
> > > > 
> > > > Four, I am aware of disposable VMs but for a working desktop these are 
> > > > of marginal use outside experimentation, malware testing, untrusted web 
> > > > browsing, etc.  They are not practical for a work environment where you 
> > > > need persistent configurations, caches, etc. Perhaps this would 
> > > > indicate QubeOS is just not intended or currently a good candidate for 
> > > > such an environment if their use is the expectation which is not how I 
> > > > understood its overall intent.
> > > 
> > > You should read the thread more carefully.
> > > You are simply wrong about this. Again, more experience in working with
> > > qubes may change your mind.
> > > I have set up working desktops for many users where all the heavy lifting
> > > is performed in disposableVMs, and the persistent qubes are used only
> > > for storage.
> > > Look at something like Bromium, which uses the equivalent of
> > > disposableVMs in a working desktop. It's a viable model and works right
> > > now.
> > > 
> > 
> > I do need to look at how this would work for my scenario more deeply as its 
> > admittedly a paradigm shift but the practicality of maintenance of so many 
> > DispVMs seems overwhelming to me and the value of that overhead 
> > questionable. 
> > 
> 
> The beauty of it is that there isn't maintenance of many dispVMs - you
> can do almost everything with ONE DVMTemplate.
> 
> Let's take a concrete example:
> You run a storage qube based on a minimal template - if you insist
> put in a basic file manager.
> Configure a DVMTemplate with pdf viewer, libreoffice, image viewers,
> vlc, anything you like. 
> Browse the web in a disposableVM - save any files you want and qvm-copy
> them to the storage qube. Now it doesn't matter if you have backdoored
> files, malware, or what. It doesn't matter because it will never be RUN
> in the storage qube.
> (You can configure the mime and default associations to use
> qvm-open-in-dvm, so you can double click on a file and it will
> automatically open disposableVM and display it there.) If you ensure the
> disposableVM is spawned offline there is (almost) no chance of data being
> exfiltrated.
> That seems like a valuable result to be gained from configuration of a
> single file - mailcap, mime type - and there's almost no overhead.
> 
> Most users who have this sort of set-up don't find anything to
> comment on - I think they see the "starting dispVM message" just as
> another splash screen. That's just anecdotal evidence, I know,but it's my
> experience. Even the start up speed doesn't seem outrageous.
> 
> Two things to get used to are NOT saving under a new name in the
> DisposableVM, and having to create a new document in the qube before it
> can be edited in the disposableVM. I've got round this by a simple
> script associated with a Menu Item that prompts for the file name,
> creates an empty file with that name, and opens THAT in a disposable VM
> for editing.

When you mentioned dispvms I was thinking more along the lines of them applying 
to all of my "work environments". For example, I use a LOT of ssh tunneling and 
adding the keys and configurations back in every time would be a real pain in 
the rump. I might post another thread (if one does not exist) asking about 
managing ssh keys. One thing I played around with in SELinux was the ability 
for a command to gain access to the keys but nothing else could. That is, X 
process and Y user were the only ones with access and they would spawn the 
tunnels other processes and users ended up using.

Regarding my issues with /usr/bin not rewriting it was a standalone vm. 
(PEBCAK) No idea how but I somehow unintentionally deployed one of the AppVMs 
as a standalone.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6fb0ff29-800a-4aee-8b0c-cacd86d826bf%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Kicking the sudoers dead horse

2017-03-13 Thread Unman
On Mon, Mar 13, 2017 at 11:50:59AM -0700, hib0...@gmail.com wrote:
> > > 
> > > Four, I am aware of disposable VMs but for a working desktop these are of 
> > > marginal use outside experimentation, malware testing, untrusted web 
> > > browsing, etc.  They are not practical for a work environment where you 
> > > need persistent configurations, caches, etc. Perhaps this would indicate 
> > > QubeOS is just not intended or currently a good candidate for such an 
> > > environment if their use is the expectation which is not how I understood 
> > > its overall intent.
> > 
> > You should read the thread more carefully.
> > You are simply wrong about this. Again, more experience in working with
> > qubes may change your mind.
> > I have set up working desktops for many users where all the heavy lifting
> > is performed in disposableVMs, and the persistent qubes are used only
> > for storage.
> > Look at something like Bromium, which uses the equivalent of
> > disposableVMs in a working desktop. It's a viable model and works right
> > now.
> > 
> 
> I do need to look at how this would work for my scenario more deeply as its 
> admittedly a paradigm shift but the practicality of maintenance of so many 
> DispVMs seems overwhelming to me and the value of that overhead questionable. 
> 

The beauty of it is that there isn't maintenance of many dispVMs - you
can do almost everything with ONE DVMTemplate.

Let's take a concrete example:
You run a storage qube based on a minimal template - if you insist
put in a basic file manager.
Configure a DVMTemplate with pdf viewer, libreoffice, image viewers,
vlc, anything you like. 
Browse the web in a disposableVM - save any files you want and qvm-copy
them to the storage qube. Now it doesn't matter if you have backdoored
files, malware, or what. It doesn't matter because it will never be RUN
in the storage qube.
(You can configure the mime and default associations to use
qvm-open-in-dvm, so you can double click on a file and it will
automatically open disposableVM and display it there.) If you ensure the
disposableVM is spawned offline there is (almost) no chance of data being
exfiltrated.
That seems like a valuable result to be gained from configuration of a
single file - mailcap, mime type - and there's almost no overhead.

Most users who have this sort of set-up don't find anything to
comment on - I think they see the "starting dispVM message" just as
another splash screen. That's just anecdotal evidence, I know,but it's my
experience. Even the start up speed doesn't seem outrageous.

Two things to get used to are NOT saving under a new name in the
DisposableVM, and having to create a new document in the qube before it
can be edited in the disposableVM. I've got round this by a simple
script associated with a Menu Item that prompts for the file name,
creates an empty file with that name, and opens THAT in a disposable VM
for editing.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170313230019.GA7137%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Kicking the sudoers dead horse

2017-03-13 Thread hib0x13
On Monday, March 13, 2017 at 1:37:04 PM UTC-4, Unman wrote:
> On Mon, Mar 13, 2017 at 08:13:31AM -0700, @gmail.com wrote:
> > The main purpose of this or any security system is to mitigate risk. I 
> > suspect we all agree on this?
> > 
> > One advantage of having sudo restricted is it reduces the attack foot print 
> > to installing a root level compromise on the system which will persist and 
> > could then be used as a launch pad for further surveillance and attacks. 
> > Root level access also means it could be extremely stealthy which a 
> > compromise as user@ would be far less capable of.
> > 
> > The problem is while only my user data has been compromised vs the entire 
> > system it is a persistent threat. Every boot its a threat. For all intent 
> > and purpose I will have no clue this is sitting there watching me and 
> > waiting. Waiting for what?  How about another VM escape attack?  They have 
> > already been exposed and frankly they will continue to be. Or how about a 
> > cross-vm row hammer attack?  To think that mere isolation via 
> > virtualization is enough is, as I think someone above commented, foolhardy.
> 
> It *may* be a persistent threat - I think you need to read more about
> how the qube file system is built up.
> 
> > 
> > Personally at this point I would rather remove sudo from the system, grant 
> > root a password then have the user "su -".  I tried this, other than 
> > removing sudo, and it worked until a reboot at which point it recreated the 
> > sudoers file and reset the password. The one thing I think would have 
> > increased security of the system, was very easy, did not seem to have a 
> > negative impact, was erased.
> 
> If you really want to do this, then you have to make that change in the
> template, not in a qube. Of course, you are free to do so. It's a matter
> of some concern that you haven't realised this.
> 
> > 
> > I only skimmed the thread so I apologize for my laziness up front if I 
> > missed something but I think a few clarifications need to be made about my 
> > experiences thus far. The following statements are with reference to the 
> > fedora-24 template which was downloaded 05/10/17.
> 
> 
> It's a shame you've only skimmed the thread you kicked off, because
> there is a good deal of interesting information there, and many
> interesting perspectives.
> 
> Over at qubes-issues, Joanna commented on the dom0 control, (NOT as
> password as Chris rightly stressed,  but a mechanism in dom0 for requiring
> user acknowledgement before granting root rights in a qube:
> 
> "I'd worry more about sending a false-sense-of-security signal that
> (presumably) Dom0 is able to strictly control user -> root escalations
> within VMs (which it really cannot 100% as explained in the linked
> page)."
> 
> Of course, hers is just another voice, but it's one worth listening to.
> 
> > 
> > First I read the reasons for allowing sudo but if VM isolation was enough 
> > then frankly there is no point to running SELinux or sudo restrictions on 
> > servers and I am going to wager few people would agree with this. While I 
> > realize there is a difference here in that no other real people should be 
> > on your system the fact is that is precisely what will happen if a DomU is 
> > compromised. Just like not trusting the infrastructure you should never 
> > trust the unprivileged user accounts as much as possible. This 
> > configuration, effectively, makes user@ == root. I could use the argument 
> > you might as well run single user or everything as root. The only thing you 
> > are really stopping at this point is an attempt to violate MAC as user@ 
> > within the DomU.
> 
> I haven't heard anyone who is concerned about the absence of a password
> for root access suggesting that they should institute user passwords in
> their qubes. Why is this?
> Many users, as is evident from their postings, DONT trust user accounts
> in their qubes, (which means in practice that they DONT trust that
> qube.
> 
> > 
> > Second I also read about how you can re-enable a password on sudo and I 
> > think, by in large, I understand why this could be problematic to the 
> > operations of the system. I will definitely be testing this but if its 
> > going to be unsupported I see very little point in doing so. A system which 
> > is used for production that becomes unstable in the name of security is 
> > border line worse than a less secure system. That is, enabling this could 
> > render the system unusable upon updates etc.
> 
> You can re-enable a password , or follow the suggestion which will
> provide a dom0 prompt. It's not unsupported, and wont make the system
> unusable.
> 
> 
> > 
> > Third, adding /usr/bin/evolution remains after a restart of the VM. I dont 
> > know if I pressed the "Create a new VM" button wrong or what but its clear 
> > the "root filesystem" does not, at least entirely, get rewritten. At least 
> > not the above mentioned template. Assuming I didnt zig 

Re: [qubes-users] Re: Kicking the sudoers dead horse

2017-03-13 Thread Unman
On Mon, Mar 13, 2017 at 08:13:31AM -0700, hib0...@gmail.com wrote:
> The main purpose of this or any security system is to mitigate risk. I 
> suspect we all agree on this?
> 
> One advantage of having sudo restricted is it reduces the attack foot print 
> to installing a root level compromise on the system which will persist and 
> could then be used as a launch pad for further surveillance and attacks. Root 
> level access also means it could be extremely stealthy which a compromise as 
> user@ would be far less capable of.
> 
> The problem is while only my user data has been compromised vs the entire 
> system it is a persistent threat. Every boot its a threat. For all intent and 
> purpose I will have no clue this is sitting there watching me and waiting. 
> Waiting for what?  How about another VM escape attack?  They have already 
> been exposed and frankly they will continue to be. Or how about a cross-vm 
> row hammer attack?  To think that mere isolation via virtualization is enough 
> is, as I think someone above commented, foolhardy.

It *may* be a persistent threat - I think you need to read more about
how the qube file system is built up.

> 
> Personally at this point I would rather remove sudo from the system, grant 
> root a password then have the user "su -".  I tried this, other than removing 
> sudo, and it worked until a reboot at which point it recreated the sudoers 
> file and reset the password. The one thing I think would have increased 
> security of the system, was very easy, did not seem to have a negative 
> impact, was erased.

If you really want to do this, then you have to make that change in the
template, not in a qube. Of course, you are free to do so. It's a matter
of some concern that you haven't realised this.

> 
> I only skimmed the thread so I apologize for my laziness up front if I missed 
> something but I think a few clarifications need to be made about my 
> experiences thus far. The following statements are with reference to the 
> fedora-24 template which was downloaded 05/10/17.


It's a shame you've only skimmed the thread you kicked off, because
there is a good deal of interesting information there, and many
interesting perspectives.

Over at qubes-issues, Joanna commented on the dom0 control, (NOT as
password as Chris rightly stressed,  but a mechanism in dom0 for requiring
user acknowledgement before granting root rights in a qube:

"I'd worry more about sending a false-sense-of-security signal that
(presumably) Dom0 is able to strictly control user -> root escalations
within VMs (which it really cannot 100% as explained in the linked
page)."

Of course, hers is just another voice, but it's one worth listening to.

> 
> First I read the reasons for allowing sudo but if VM isolation was enough 
> then frankly there is no point to running SELinux or sudo restrictions on 
> servers and I am going to wager few people would agree with this. While I 
> realize there is a difference here in that no other real people should be on 
> your system the fact is that is precisely what will happen if a DomU is 
> compromised. Just like not trusting the infrastructure you should never trust 
> the unprivileged user accounts as much as possible. This configuration, 
> effectively, makes user@ == root. I could use the argument you might as well 
> run single user or everything as root. The only thing you are really stopping 
> at this point is an attempt to violate MAC as user@ within the DomU.

I haven't heard anyone who is concerned about the absence of a password
for root access suggesting that they should institute user passwords in
their qubes. Why is this?
Many users, as is evident from their postings, DONT trust user accounts
in their qubes, (which means in practice that they DONT trust that
qube.

> 
> Second I also read about how you can re-enable a password on sudo and I 
> think, by in large, I understand why this could be problematic to the 
> operations of the system. I will definitely be testing this but if its going 
> to be unsupported I see very little point in doing so. A system which is used 
> for production that becomes unstable in the name of security is border line 
> worse than a less secure system. That is, enabling this could render the 
> system unusable upon updates etc.

You can re-enable a password , or follow the suggestion which will
provide a dom0 prompt. It's not unsupported, and wont make the system
unusable.


> 
> Third, adding /usr/bin/evolution remains after a restart of the VM. I dont 
> know if I pressed the "Create a new VM" button wrong or what but its clear 
> the "root filesystem" does not, at least entirely, get rewritten. At least 
> not the above mentioned template. Assuming I didnt zig when I should have 
> zagged, a nasty could copy a file to /usr/bin and it would persist across 
> reboots, upgrades, etc. This could then be easily enabled to start on any app 
> start and run as root. It would also be difficult to detect.


[qubes-users] Re: Kicking the sudoers dead horse

2017-03-13 Thread hib0x13
The main purpose of this or any security system is to mitigate risk. I suspect 
we all agree on this?

One advantage of having sudo restricted is it reduces the attack foot print to 
installing a root level compromise on the system which will persist and could 
then be used as a launch pad for further surveillance and attacks. Root level 
access also means it could be extremely stealthy which a compromise as user@ 
would be far less capable of.

The problem is while only my user data has been compromised vs the entire 
system it is a persistent threat. Every boot its a threat. For all intent and 
purpose I will have no clue this is sitting there watching me and waiting. 
Waiting for what?  How about another VM escape attack?  They have already been 
exposed and frankly they will continue to be. Or how about a cross-vm row 
hammer attack?  To think that mere isolation via virtualization is enough is, 
as I think someone above commented, foolhardy.

Personally at this point I would rather remove sudo from the system, grant root 
a password then have the user "su -".  I tried this, other than removing sudo, 
and it worked until a reboot at which point it recreated the sudoers file and 
reset the password. The one thing I think would have increased security of the 
system, was very easy, did not seem to have a negative impact, was erased.

I only skimmed the thread so I apologize for my laziness up front if I missed 
something but I think a few clarifications need to be made about my experiences 
thus far. The following statements are with reference to the fedora-24 template 
which was downloaded 05/10/17.

First I read the reasons for allowing sudo but if VM isolation was enough then 
frankly there is no point to running SELinux or sudo restrictions on servers 
and I am going to wager few people would agree with this. While I realize there 
is a difference here in that no other real people should be on your system the 
fact is that is precisely what will happen if a DomU is compromised. Just like 
not trusting the infrastructure you should never trust the unprivileged user 
accounts as much as possible. This configuration, effectively, makes user@ == 
root. I could use the argument you might as well run single user or everything 
as root. The only thing you are really stopping at this point is an attempt to 
violate MAC as user@ within the DomU.

Second I also read about how you can re-enable a password on sudo and I think, 
by in large, I understand why this could be problematic to the operations of 
the system. I will definitely be testing this but if its going to be 
unsupported I see very little point in doing so. A system which is used for 
production that becomes unstable in the name of security is border line worse 
than a less secure system. That is, enabling this could render the system 
unusable upon updates etc.

Third, adding /usr/bin/evolution remains after a restart of the VM. I dont know 
if I pressed the "Create a new VM" button wrong or what but its clear the "root 
filesystem" does not, at least entirely, get rewritten. At least not the above 
mentioned template. Assuming I didnt zig when I should have zagged, a nasty 
could copy a file to /usr/bin and it would persist across reboots, upgrades, 
etc. This could then be easily enabled to start on any app start and run as 
root. It would also be difficult to detect.

Four, I am aware of disposable VMs but for a working desktop these are of 
marginal use outside experimentation, malware testing, untrusted web browsing, 
etc.  They are not practical for a work environment where you need persistent 
configurations, caches, etc. Perhaps this would indicate QubeOS is just not 
intended or currently a good candidate for such an environment if their use is 
the expectation which is not how I understood its overall intent.

If I was attacking a QubeOS system I would very likely first start by 
compromising the DomU's, clearly the largest target to hit, and having direct 
access via the user with zero restrictions to root is a perfect place to start 
to plant my "observation rootkit". If I was attacking any system one of the 
first things I would try is gaining root the easiest way. sudo or su. ie: 
Engine wont start? Check gas.

It seems obvious to me this will increase security of the system overall. 
Outside of technical problems I also think the argument for ease of use for the 
user (ie: patching) is a very weak stance vs the security that would be gained. 
Perhaps at least having the supported option to "enable sudo password" or 
probably better "disable sudo and use su only" is of merit.

Anyhow, much appreciate the chat and thanks!  

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this 

Re: [qubes-users] Re: Kicking the sudoers dead horse

2017-03-11 Thread Unman
On Sat, Mar 11, 2017 at 01:10:32PM -0800, Daniel Moerner wrote:
> On Friday, March 10, 2017 at 9:55:08 PM UTC-5, Unman wrote:
> > So yes, in a very real sense, it doesn't matter
> > to me if the qube where I collect mail, (which isn't the qube where I
> > read it) is compromised in some way.
> 
> Hi Unman,
> 
> Could you explain your setup for collecting mail in one Qube and reading it 
> in another? I currently use Qubes for each mail account, running mutt and 
> offlineimap, and opening links in disposable VMs. But collecting mail in one 
> Qube and reading it in another is interesting to me.
> 
> Daniel
> 

Hello Daniel

It was interesting to see someone else in the thread refer to a
similar setup. (Look at 7v5w7go9ub0o earlier.) They use a disposableVM to
process the mail.

I use a number of different mail servers: like you I use mutt and
offlineimap,(and rsync and notmuch). 
I use mini templates in different flavours, mailcaps to open files in
disposableVMs. (Lots of people will hate everything about this.) I use
more than one TorVM.

I have multiple dispVMTemplates, some online and some not. A mail
archive is not network connected and is based on a mini template.
Like 7v5w7go9ub0o I use simple scripting - fire up disposableVM, run
rsync/offlineimap, qvm-move mailfile in to reader. Process mail, with any
attachments opened in disposableVM, as you do, using Split GPG.
Outgoing mail is copied to a mailqueue in another qube, and sent from
there.

As far as use is concerned, it just feels like any other mutt
session. Everything is scripted, (and tied together with bits of
string) but it works. The only difference from what you are doing is that
your mutt qube is network connected. and mine isn't.

Of course, in other cases I'll ssh to a box and use mail from there -
or use some webmail - that's straight forward 

I'm sure there are many users doing something similar.

unman

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170312002806.GC25808%40thirdeyesecurity.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Kicking the sudoers dead horse

2017-03-11 Thread Daniel Moerner
On Friday, March 10, 2017 at 9:55:08 PM UTC-5, Unman wrote:
> So yes, in a very real sense, it doesn't matter
> to me if the qube where I collect mail, (which isn't the qube where I
> read it) is compromised in some way.

Hi Unman,

Could you explain your setup for collecting mail in one Qube and reading it in 
another? I currently use Qubes for each mail account, running mutt and 
offlineimap, and opening links in disposable VMs. But collecting mail in one 
Qube and reading it in another is interesting to me.

Daniel

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/21ad2eab-051e-43b2-afd6-5c3c0edcc34a%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Kicking the sudoers dead horse

2017-03-10 Thread andresmrm
Hello!

The "open" root behavior seems a little strange to me too. But, thinking 
coldly, what would change in your scenario if root was protected?

The attacker would not be able to modify /usr/bin/audacious, or install 
muhbackdoorz to system. But she/he could still delete all your home data, or 
send it through web, or install something inside home and add it to .bashrc, or 
...

Considering all important data in a DomU is owned by one user, and neither root 
nor the non-root user can leave DomU, the damage caused by any of them seems 
almost the same.

More info:
https://www.qubes-os.org/doc/vm-sudo/


Regards!

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bd734ccd-61ca-4be7-a590-46de944a9324%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.