zlacker

[parent] [thread] 26 comments
1. mrotte+(OP)[view] [source] 2014-10-08 22:29:46
While I am all for virtualizing, it doesn't help security. It just moves the exploit from your OS into your hypervisor. Even worse, you add a whole new level of exploitable code.
replies(4): >>spindr+f >>na85+b1 >>vidarh+D2 >>timmcl+Y4
2. spindr+f[view] [source] 2014-10-08 22:33:21
>>mrotte+(OP)
Of course it improves security. On Qubes, someone who can exploit your browser (pdf reader, word processor) doesn't automatically get free rein on your machine. They still need to escape Xen.
replies(2): >>csirac+z1 >>mrotte+K2
3. na85+b1[view] [source] 2014-10-08 22:47:52
>>mrotte+(OP)
I take it you've not heard of the phrase "defensive depth".
replies(2): >>gerald+D1 >>mrotte+p3
◧◩
4. csirac+z1[view] [source] [discussion] 2014-10-08 22:53:53
>>spindr+f
Not just apps, it even routes physical USB devices to specific VMs, which potentially mitigates BadUSB type attacks against the dom0.

And I really appreciate that they've tried to solve XDMCP weaknesses.

◧◩
5. gerald+D1[view] [source] [discussion] 2014-10-08 22:56:10
>>na85+b1
Shouldn't that be "defense in depth"?
replies(1): >>anth1y+12
◧◩◪
6. anth1y+12[view] [source] [discussion] 2014-10-08 23:05:03
>>gerald+D1
for those unaware: http://en.wikipedia.org/wiki/Defense_in_depth_%28computing%2...
7. vidarh+D2[view] [source] 2014-10-08 23:19:20
>>mrotte+(OP)
That's nonsense. It doesn't automatically help security.

But compartmentalization does mean that barring a hypervisor exploit, each exploit can potentially be prevented from affecting more than a small part of the system.

I care a whole lot less if Chrome is exploited if it can't access my ssh keys, for example (not that I wouldn't still care, but the potential damage would be limited).

replies(1): >>mrotte+N2
◧◩
8. mrotte+K2[view] [source] [discussion] 2014-10-08 23:20:31
>>spindr+f
Nope. If somebody exploits your PDF reader, they still have to circumvent the OS. Sound familiar?

Now instead of one layer with hardware contact, you have two (assuming you want performance too). Twice the attack surface.

replies(3): >>amalco+V4 >>wyager+g5 >>walter+q9
◧◩
9. mrotte+N2[view] [source] [discussion] 2014-10-08 23:21:37
>>vidarh+D2
Why don't you just use different user accounts and permissions? That way you don't have to trust extra code and can achieve the same goal.

Edit: But the way you talk to me, obviously I must be stupid.

replies(1): >>csirac+Ha
◧◩
10. mrotte+p3[view] [source] [discussion] 2014-10-08 23:31:40
>>na85+b1
The difference here is, you might feel safer but you are still in the exact same position as before, a bug in your hypervisor/Meta-OS screws you. I'd argue that is a harmful comfort.
replies(1): >>Elhana+6l
◧◩◪
11. amalco+V4[view] [source] [discussion] 2014-10-09 00:03:54
>>mrotte+K2
This would be sound logic if existing desktop operating systems had actual good security models.

In the real world, if someone exploits your PDF reader, they don't have to circumvent your OS: your OS hands over everything you can access, by design. One could argue that a better security model baked into the OS would make more sense than a virtualization hack, but the latter has the advantage of actually existing.

replies(1): >>Touche+f9
12. timmcl+Y4[view] [source] 2014-10-09 00:04:09
>>mrotte+(OP)
This document[1] talks about that risk and what they've done to mitigate it at the bottom of page 10.

[1] http://www.invisiblethingslab.com/resources/2014/Software_co...

◧◩◪
13. wyager+g5[view] [source] [discussion] 2014-10-09 00:08:20
>>mrotte+K2
> If somebody exploits your PDF reader, they still have to circumvent the OS.

That is correct. This is probably why privesc exploits are much more expensive than adobe reader exploits.

You are kind of arguing against yourself here.

◧◩◪◨
14. Touche+f9[view] [source] [discussion] 2014-10-09 01:33:21
>>amalco+V4
What would be the better security model?
replies(1): >>SamRei+jb
◧◩◪
15. walter+q9[view] [source] [discussion] 2014-10-09 01:35:33
>>mrotte+K2
> Now instead of one layer with hardware contact, you have two (assuming you want performance too).

Could you expand on that statement? By definition, only one layer can own each hardware component.

◧◩◪
16. csirac+Ha[view] [source] [discussion] 2014-10-09 02:04:54
>>mrotte+N2
I'd say the reasoning is that you then have to trust there are no privesc/bypass opportunities in your environment. Trusting that all your dbus/pulseaudio/network-manager/cups/fuse/display manager & friends aren't going to give your rogue chrome process on one account some kind of access to another (thanks to X11/XDMCP, they'll at least have keylogging) - that's a big surface area, aas in: space is big. Really big. You just won't believe how vastly, hugely, mind-bogglingly big it is.

Compared to the few hundred lines in the hypervisor providing VM-level isolation you'd be a bit mad to say that these are equivalent means of isolation.

◧◩◪◨⬒
17. SamRei+jb[view] [source] [discussion] 2014-10-09 02:23:12
>>Touche+f9
Somebody exploiting your PDF reader can't upload all your email.
replies(1): >>Touche+dg
◧◩◪◨⬒⬓
18. Touche+dg[view] [source] [discussion] 2014-10-09 04:16:52
>>SamRei+jb
That's not a model. What's the model that prevents this? User performs a 2-step auth every time code executes?
replies(1): >>SamRei+Kg
◧◩◪◨⬒⬓⬔
19. SamRei+Kg[view] [source] [discussion] 2014-10-09 04:28:50
>>Touche+dg
Just pick one that gives the feature I described without being a pain to the user.
replies(1): >>Touche+Dh
◧◩◪◨⬒⬓⬔⧯
20. Touche+Dh[view] [source] [discussion] 2014-10-09 04:55:44
>>SamRei+Kg
I know of no such models. Perhaps someone smarter than me has thought of them, that's why I asked the question initially.
replies(2): >>SamRei+1j >>pjmlp+Su
◧◩◪◨⬒⬓⬔⧯▣
21. SamRei+1j[view] [source] [discussion] 2014-10-09 05:38:09
>>Touche+Dh
Sandboxing. It's present on OS X.
replies(1): >>Touche+TD
◧◩◪
22. Elhana+6l[view] [source] [discussion] 2014-10-09 06:35:46
>>mrotte+p3
The idea is that hypervisor is significantly smaller than the OS/kernel, so there will be less bugs. Not that they never happen, Xen had one recently.
◧◩◪◨⬒⬓⬔⧯▣
23. pjmlp+Su[view] [source] [discussion] 2014-10-09 11:26:20
>>Touche+Dh
Sandboxing, where each process is only allowed to use a precise set of system resources.

Any attempt to use anything else leads to termination.

replies(1): >>Touche+ND
◧◩◪◨⬒⬓⬔⧯▣▦
24. Touche+ND[view] [source] [discussion] 2014-10-09 13:42:59
>>pjmlp+Su
Which resources are they allowed to use? What defines which resources they are given?
replies(1): >>pjmlp+1L1
◧◩◪◨⬒⬓⬔⧯▣▦
25. Touche+TD[view] [source] [discussion] 2014-10-09 13:44:02
>>SamRei+1j
I'm confused. The original person I responded to said that no desktop OSes had good security models. On OSX I can write a script that, when run as a user, has access to everything the user has access to. So what exactly are you talking about?
replies(1): >>SamRei+ZS
◧◩◪◨⬒⬓⬔⧯▣▦▧
26. SamRei+ZS[view] [source] [discussion] 2014-10-09 16:02:43
>>Touche+TD
I'm talking about OS X sandboxing. The hypothetical PDF reader doesn't have access to the email.
◧◩◪◨⬒⬓⬔⧯▣▦▧
27. pjmlp+1L1[view] [source] [discussion] 2014-10-10 06:46:15
>>Touche+ND
> Which resources are they allowed to use?

The system administrator at installation time.

> What defines which resources they are given?

Applications just have a request list of what they require.

If the administrator doesn't allow them for the given application modules (executable, dynamic library, function call,...), bad luck.

[go to top]