zlacker

[return to "Qubes OS: A reasonably secure operating system"]
1. magnat+pi[view] [source] 2017-11-19 19:48:43
>>ploggi+(OP)
Joanna's (Qubes OS Founder) blog [1] is a gold mine when it comes to hardware-software boundary security. Especially "State considered harmful" [2] and "x86 considered harmful" [3] papers are eye-openers.

[1] https://blog.invisiblethings.org/

[2] https://blog.invisiblethings.org/papers/2015/state_harmful.p...

[3] https://blog.invisiblethings.org/papers/2015/x86_harmful.pdf

◧◩
2. jstewa+wp[view] [source] 2017-11-19 21:21:38
>>magnat+pi
That's why I don't get Qubes. She knows what a steaming pile PC hardware is, and decides to write a spinoff OS for it???

Seems like she'd have more effect designing hardware.

◧◩◪
3. rdiddl+mF[view] [source] 2017-11-20 00:55:10
>>jstewa+wp
Q: Would the steaming pile be stinkier with an easy way to deploy & use VMs to separate things, or without?

A: Stinkier without, therefore Qubes.

◧◩◪◨
4. jstewa+TI[view] [source] 2017-11-20 01:50:19
>>rdiddl+mF
That's assuming the virtualization extensions are doing their job, and the other parts of the processor aren't leaking anything, and that Xen doesn't have any problems, and that the Qubes additions are solid, and that various interactions between these layers won't present any other problems, and probably a few other things...

I'd consider betting on one of those things being solid on its own, but not all of them together.

◧◩◪◨⬒
5. rdiddl+OJ[view] [source] 2017-11-20 02:03:06
>>jstewa+TI
Well it obviously doesn't compete with whatever you're currently doing that solves all the same problems perfectly.
◧◩◪◨⬒⬓
6. jstewa+oK[view] [source] 2017-11-20 02:11:19
>>rdiddl+OJ
Why does it have to get personal rdiddly?

If you've spent any time with Intel's phone-book-sized opcode manual, or following the history of the PC, you get real skeptical when the words "secure" and "PC" are mentioned together.

◧◩◪◨⬒⬓⬔
7. rdiddl+q11[view] [source] 2017-11-20 07:13:53
>>jstewa+oK
Apologies for the sarcasm, really I'm just wondering what you're using then. To me there's no "secure" and "insecure," there's only "more secure" and "less secure."
◧◩◪◨⬒⬓⬔⧯
8. jstewa+3H1[view] [source] 2017-11-20 16:10:30
>>rdiddl+q11
PC x86 architecture (including the Mac), for at least the past 20 years, has been cost-optimized as a games/performance machine, not a security one. Until that changes, the more/less secure axis is always going to be heavily biased towards "less" on the PC, regardless of what you run on top of it.

In my own space, the approach has typically been to minimize attack surface by using the least amount of the simplest possible hardware we can get away with, then verifying the hell out of it. 8/16-bit micros, RS-232, no BIOS, aggressive shielding, and an extreme approach to the actor model. For things that need more horsepower, super-simple 32-bit micros, a real-time microkernel, and loads of QA. It's not perfect, and we leave a lot of performance on the table, but as far as security-per-man-hour-expended goes, I'd put it up against anything on the PC any day of the week.

nickpsecurity made a very good comment on designs circulating in the assurance/defense sectors: https://news.ycombinator.com/item?id=15571546

The best part of his comment was the quote from Brian Snow:

"The problem is innately difficult because from the beginning (ENIAC, 1944), due to the high cost of components, computers were built to share resources (memory, processors, buses, etc.). If you look for a one-word synopsis of computer design philosophy, it was and is sharing. In the security realm, the one word synopsis is separation: keeping the bad guys away from the good guys' stuff!

So today, making a computer secure requires imposing a "separation paradigm" on top of an architecture built to share. That is tough! Even when partially successful, the residual problem is going to be covert channels (i.e. side channels). We really need to focus on making a secure computer, not on making a computer secure -- the point of view changes your beginning assumptions and requirements."

[go to top]