-
-
Notifications
You must be signed in to change notification settings - Fork 48
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Security FAQ page? #2704
Comments
Do I understand correctly that some of the information that would appear on this Security FAQ page is currently distributed across the Security Guidelines, User FAQ, and Dev FAQ? If so, there would be two basic parts:
If we were to do this, we would end up with three different FAQs (User, Dev, and Security). Perhaps it would be better to consolidate them all into a single FAQ with three sections. What do you think? |
IMHO the qubes docs generally right now has a pattern of pages with similar (but not quite identical) goals which could benefit from some merging and/or restructuring. For example, there are three similar and partially duplicate pages on copying between domains:
I remember cases on the mailing lists where it seemed people had read one but not noticed the existence of another. I started to deduplicate them, but... other priorities. |
Reassigning to @rootkovska to answer the questions posed above. In addition, since it's been eight months since our last activity on this issue, I want to make sure the original goals of this issue are still the same. |
Consolidations into single pages (but with a good structure that allows to easily bookmark into specific subsection) is always good, IMHO. |
@rootkovska or @marmarek, could you please provide (or point me to) the answers to these questions? I want to make sure I include accurate answers in the FAQ. |
_doc: object 9612a861a64768ad10d196a4544d46cc9d726e91 type commit tag adw_9612a861 tagger Andrew David Wong <[email protected]> 1510812488 -0600 Tag for commit 9612a861a64768ad10d196a4544d46cc9d726e91 9612a86 Add link to Security FAQ (QubesOS/qubes-issues#2704)
Bump. |
The last question could be answered "using /dev/urandom from Dom0 to seed the VMs is ok because initialized /dev/urandom is ok for everything", and |
Entropy is required before The following website gives a few details: mirage invented xentropyd KVM invented Virtio RNG Xen has no such equivalent. One could argue, that the entropy used before |
Can you point me to some information on that? The first link mentions generating keys and setting up network connections, but it seems that either of those should happen way after systemd-random-seed.service inside a VM. I just checked one thing that seemed "promising", MAC randomization - but NetworkManager has DefaultDependencies=yes, so it is ordered after basic.target <- sysinit.target <- systemd-random-seed.service. It would definitely be interesting, from a holistic perspective, to trace if any random data is consumed from a nonblocking source before random initialization on a modern system, whether it is running inside a VM or on bare metal...
Isn't the Qubes drop-in for systemd-random-seed.service the equivalent? It's not a daemon that continuously feeds entropy, but that could be harmful anyway, sez djb:
|
Huh, looks like the kernel would already print At the next level, "initialized" ( And at the last level, "initialized from input_pool" ( So apparently, adding a warning on |
The entropy issue is clearly a point of contention that requires further testing and lies beyond my expertise. I've created the Security FAQ section and populated it with all desired FAQs except that one. Therefore, I'm closing this issue as complete and leaving the entropy issue to #673. |
We should probably have a page explaining some less obvious aspects of security architecture and implementation of Qubes OS. The list of topics could be constructed by observing people asking (good or popular) questions on our ML or on Twitter.
One example could be this: how does Qubes assure good randomness in VMs and how does the
systemd-random-seed
and specifically ourqubes-random-seed.sh
work? E.g. why using /dev/urandom from Dom0 to seed the VMs is ok.Perhaps we could have a section/page on https://www.qubes-os.org/doc/, preferably within the "Security Information" section, something like "Security FAQ"?
Perhaps we could also link to our upcoming "List of Xen vulnerabilities which do and do not affect Qubes OS" page? (#2703)
The text was updated successfully, but these errors were encountered: