zlacker

[return to "Qubes – Secure Desktop OS Using Security by Compartmentalization"]
1. mrotte+Bl[view] [source] 2014-10-08 22:29:46
>>tete+(OP)
While I am all for virtualizing, it doesn't help security. It just moves the exploit from your OS into your hypervisor. Even worse, you add a whole new level of exploitable code.
◧◩
2. spindr+Ql[view] [source] 2014-10-08 22:33:21
>>mrotte+Bl
Of course it improves security. On Qubes, someone who can exploit your browser (pdf reader, word processor) doesn't automatically get free rein on your machine. They still need to escape Xen.
◧◩◪
3. mrotte+lo[view] [source] 2014-10-08 23:20:31
>>spindr+Ql
Nope. If somebody exploits your PDF reader, they still have to circumvent the OS. Sound familiar?

Now instead of one layer with hardware contact, you have two (assuming you want performance too). Twice the attack surface.

◧◩◪◨
4. amalco+wq[view] [source] 2014-10-09 00:03:54
>>mrotte+lo
This would be sound logic if existing desktop operating systems had actual good security models.

In the real world, if someone exploits your PDF reader, they don't have to circumvent your OS: your OS hands over everything you can access, by design. One could argue that a better security model baked into the OS would make more sense than a virtualization hack, but the latter has the advantage of actually existing.

◧◩◪◨⬒
5. Touche+Qu[view] [source] 2014-10-09 01:33:21
>>amalco+wq
What would be the better security model?
◧◩◪◨⬒⬓
6. SamRei+Uw[view] [source] 2014-10-09 02:23:12
>>Touche+Qu
Somebody exploiting your PDF reader can't upload all your email.
◧◩◪◨⬒⬓⬔
7. Touche+OB[view] [source] 2014-10-09 04:16:52
>>SamRei+Uw
That's not a model. What's the model that prevents this? User performs a 2-step auth every time code executes?
◧◩◪◨⬒⬓⬔⧯
8. SamRei+lC[view] [source] 2014-10-09 04:28:50
>>Touche+OB
Just pick one that gives the feature I described without being a pain to the user.
◧◩◪◨⬒⬓⬔⧯▣
9. Touche+eD[view] [source] 2014-10-09 04:55:44
>>SamRei+lC
I know of no such models. Perhaps someone smarter than me has thought of them, that's why I asked the question initially.
◧◩◪◨⬒⬓⬔⧯▣▦
10. SamRei+CE[view] [source] 2014-10-09 05:38:09
>>Touche+eD
Sandboxing. It's present on OS X.
◧◩◪◨⬒⬓⬔⧯▣▦▧
11. Touche+uZ[view] [source] 2014-10-09 13:44:02
>>SamRei+CE
I'm confused. The original person I responded to said that no desktop OSes had good security models. On OSX I can write a script that, when run as a user, has access to everything the user has access to. So what exactly are you talking about?
◧◩◪◨⬒⬓⬔⧯▣▦▧▨
12. SamRei+Ae1[view] [source] 2014-10-09 16:02:43
>>Touche+uZ
I'm talking about OS X sandboxing. The hypothetical PDF reader doesn't have access to the email.
[go to top]