[prev in list] [next in list] [prev in thread] [next in thread] 

List:       tails-dev
Subject:    [Tails-dev]  Suggestion to hep with exploit mitigation...
From:       Mike Guidry <mike () mikeguidry ! net>
Date:       2016-12-31 18:07:32
Message-ID: CA+ueHvT_SNRxmRDuRNU0yNkY1t+eyq7zmmvGzB5TTSysvgaYqg () mail ! gmail ! com
[Download RAW message or body]

[Attachment #2 (multipart/alternative)]


>Tails:
>>* What means, first to enhance QEMU. In general (without ARM and QEMU)
*>>* this is - as far as I understood - the idea of the QubeOS.
*
>Right. The biggest challenge here is integrating the isolation by
>virtualization without harming user experience too much. If/once we
>have that, using x86 or ARM virtual machines might be a detail.

>We have no clear long-term plans wrt. isolation by virtualization.

>This topic raises many questions, for example because I doubt we'll
>want to raise hardware requirements significantly, so requiring VT-x
>and/or VT-d is probably a non-starter for the primary use cases
>supported by Tails. We're in the process of organizing a meeting with
>Qubes OS, Whonix and Subgraph; my personal top priority there will be
>to discuss this very topic, and get a better idea of what we could do,
>how, and when.

>Cheers,
>--
>intrigeri


I've created a project or two regarding XEN's platform used in QubeOS.
Just keep in mind that you will be grandfathering in all bugs relating
to the virtualization engine.  If you would like to see the exposure
then look at x86_emulate.c specifically.  It wouldn't be too difficult
to escape the VM in general so I think it might be worth just adding
some direct exploit mitigation techniques rather than assuming
virtualization will suffice.  You can always force x86_emulate.c's C
(gcc/clang) alternative of each instruction rather than the hardware
layer that you are expecting it to be executing on..

Several portions of its engine are pretty nasty in particular
especially when the Intel books are really confusing.. I've read 1:1
Intel manuals to their implementations in the past..

Just a thought.. shoot me an e-mail if you ever want anymore
information or to discuss either..


Thanks,

Mike

[Attachment #5 (text/html)]

<div dir="ltr"><pre style="white-space:pre-wrap;color:rgb(0,0,0)">&gt;Tails:
&gt;&gt;<i> What means, first to enhance QEMU. In general (without ARM and QEMU)
</i>&gt;&gt;<i> this is - as far as I understood - the idea of the QubeOS.
</i>
&gt;Right. The biggest challenge here is integrating the isolation by
&gt;virtualization without harming user experience too much. If/once we
&gt;have that, using x86 or ARM virtual machines might be a detail.

&gt;We have no clear long-term plans wrt. isolation by virtualization.

&gt;This topic raises many questions, for example because I doubt we&#39;ll
&gt;want to raise hardware requirements significantly, so requiring VT-x
&gt;and/or VT-d is probably a non-starter for the primary use cases
&gt;supported by Tails. We&#39;re in the process of organizing a meeting with
&gt;Qubes OS, Whonix and Subgraph; my personal top priority there will be
&gt;to discuss this very topic, and get a better idea of what we could do,
&gt;how, and when.

&gt;Cheers,
&gt;-- 
&gt;intrigeri</pre><pre style="white-space:pre-wrap;color:rgb(0,0,0)"><br></pre><pre \
style="white-space:pre-wrap;color:rgb(0,0,0)">I&#39;ve created a project or two \
regarding XEN&#39;s platform used in QubeOS.  Just keep in mind that you will be \
grandfathering in all bugs relating to the virtualization engine.  If you would like \
to see the exposure then look at x86_emulate.c specifically.  It wouldn&#39;t be too \
difficult to escape the VM in general so I think it might be worth just adding some \
direct exploit mitigation techniques rather than assuming virtualization will \
suffice.  You can always force x86_emulate.c&#39;s C (gcc/clang) alternative of each \
instruction rather than the hardware layer that you are expecting it to be executing \
on..</pre><pre style="white-space:pre-wrap;color:rgb(0,0,0)">Several portions of its \
engine are pretty nasty in particular especially when the Intel books are really \
confusing.. I&#39;ve read 1:1 Intel manuals to their implementations in the \
past..</pre><pre style="white-space:pre-wrap;color:rgb(0,0,0)">Just a thought.. shoot \
me an e-mail if you ever want anymore information or to discuss either..</pre><pre \
style="white-space:pre-wrap;color:rgb(0,0,0)"><br></pre><pre \
style="white-space:pre-wrap;color:rgb(0,0,0)">Thanks,</pre><pre \
style="white-space:pre-wrap;color:rgb(0,0,0)">Mike</pre></div>


[Attachment #6 (text/plain)]

_______________________________________________
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to Tails-dev-unsubscribe@boum.org.

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic