[prev in list] [next in list] [prev in thread] [next in thread]
List: qubes-devel
Subject: Re: [qubes-devel] Qubes Air's usefulness
From: Chris Laprise <tasket () posteo ! net>
Date: 2018-01-23 4:56:05
Message-ID: 48ed3021-925d-dde2-60ea-372a0a655dd4 () posteo ! net
[Download RAW message or body]
On 01/22/2018 09:13 PM, Kelly Dean wrote:
>
> Andrew David Wong writes:
> > Joanna Rutkowska has just published a new article titled "Qubes Air:
> > Generalizing the Qubes Architecture." The article is available both on
> > Joanna's blog:
> >
> > https://blog.invisiblethings.org/2018/01/22/qubes-air.html
> >
> > And on the Qubes website:
> >
> > https://www.qubes-os.org/news/2018/01/22/qubes-air/
>
> Qubes Air still has a master admin qube as a single point of failure. Qubes Air \
> also makes the attacker's job easier, if he's trying to traverse from one VM to \
> another within a slave zone in a system with heterogeneous VMMs, because he now has \
> another VMM to choose from, with different vulnerabilities. He can either exploit \
> the slave's VMM to gain control of the slave zone (including his target VM), or \
> exploit the master zone's VMM to gain control of the entire system (including the \
> slave's VMM). In contrast, a Qubes 4.0 system has only one VMM, so the attacker \
> doesn't get a choice.
> Qubes Air also doesn't really make deployment easier. If a user needs Qubes, that \
> means he needs more security than a conventional OS gives. So, even in the easiest \
> case (Qubes in a trusted cloud), his client device still at least needs an \
> IOMMU-isolatable network device. Without that, the entire system is compromisable \
> via the netvm, via merely an exploit of the network driver or stack, just like a \
> conventional OS, so why would he bother running Qubes in the first place? But if \
> his client device does have that feature, then the most practical OS to run on it \
> is Qubes, so he's already going to have Qubes deployed before bothering with the \
> cloud.
> So then, what good is Qubes Air? Apparently, managing a cluster computer. But \
> that's just an additional capability, after the user has already deployed and \
> secured his Qubes system in the first place. Contrary to the news article, Qubes \
> Air doesn't solve problems of initial deployment or single point of failure.
That was also how I understood the article, with my initial response here:
https://twitter.com/ttaskett/status/955540266479489024
I know that getting mired in the month-by-month compatibility issues is
a whole lot of No Fun, and that Qubes was meant to abstract-out hardware
details to some extent (use a whole OS -- pick one -- as a video or NIC
driver). But at some point the hardware will make or break us, and the
hardware we got now is Wintel; even Linux is an afterthought when you're
not looking at server components.
Even worse, Intel has quite illegally squeezed AMD out of the market,
leaving Qubes laptop buyers little choice but to wrestle with Intel
Skylake headaches. If AMD had more revenue available circa 2011, the
possible mobile APU choices later on could have offered a nice respite
for the Qubes community. (Intel still tries to avoid paying its EU
fines, and its CEO recently dumped all the stock he was legally
allowed....but I digress...)
Qubes' role appears to be taming unruly PC hardware, transforming it
into almost a different architecture through clever use of some of its
less common features. The Wintel hardware fights back, however, with
newer models (e.g. Skylake and later) refusing to work without trying
many new kernel iterations, etc. What Windows users feel as road bumps
are much more jarring to us.
But remember Microsoft isn't hardware agnostic. They have published
parameters for hardware design since the mid-1990s at least, and much of
what they write and/or certify is the result of close relationships with
hardware brands whose every product quirk is customized for Windows use.
MS has even reacted to the rough spots in their ecosystem by producing
their own PC systems.
There is one other consumer-friendly personal computer platform, Apple.
Are they hardware agnostic? :)
The next logical step seems to be in the description of open hardware
designs that will more faithfully serve Qubes' goal of strong and usable
endpoint security. It can be as simple as a list showing what qualities
a CPU, memory controller or keyboard can and cannot have, and the
minimum manifest of component types... to lay down the important
parameters that some hardware project (perhaps interested in the BOOM
processor, for example) might decide "we can do that".
In the meantime, our hardware compatibility situation isn't so terrible,
even with what the mere compatibility overlap that Xen's passthrough and
Linux drivers afford. Looked at another way, a Qubes user typically has
more models to choose from than any Mac user can claim. The dilemma is
whether we should keep finding them, or lay groundwork for building them.
-
PS - This isn't to imply that Qubes Air isn't worth pursuing. It reminds
me of a financialized BOINC: distributed computing and verification. But
currently I don't see how it can solve the user's local trust and
compatibility concerns, which serve as a foundation for all the rest.
Proponents in the age of the "Linux desktop" (circa 2004) used to claim
that Linux was a natural alternative to Windows despite hardware issues,
because apps were moving to the web... saying that if all you need is a
browser, then hardware = solved. It sure didn't turn out how they imagined.
--
Chris Laprise, tasket@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups \
"qubes-devel" group. To unsubscribe from this group and stop receiving emails from \
it, send an email to qubes-devel+unsubscribe@googlegroups.com. To post to this group, \
send email to qubes-devel@googlegroups.com. To view this discussion on the web visit \
https://groups.google.com/d/msgid/qubes-devel/48ed3021-925d-dde2-60ea-372a0a655dd4%40posteo.net.
For more options, visit https://groups.google.com/d/optout.
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic