On Wednesday, November 13, 2019 at 5:16:11 AM UTC+7, Steve Coleman wrote:
>
> On 2019-11-12 12:38, 'Jonas' via qubes-devel wrote: 
>
> > I would like to enable opensnitch firewall on every VM by default. 
>
> > what do you think about this??? 
>
>
The daemon is implemented in Go and needs to run as root in order to 
interact with the Netfilter packet ... WTF ... runs away screaming ......

 

> To be frank, it may look pretty, but it would be a big waste of CPU and 
> memory resources while providing absolutely no additional security. 
>
> - A firewall that runs inside the AppVM is easily circumvented by any 
> application or process running in that VM, thus no real security. 
>
> - You already have a real and secure Firewall by default sitting in the 
> sys-firewall VM, so why add an additional drain on your memory and CPU 
> resources. Why not learn to use what you already have available? 
>
> - You already have the means to see what you AppVM's are connecting to 
> if that is what you are after. You can simply run an app like etherape 
> (wireshark, or tcpdump) in the sys-firewall VM and see everything being 
> connected to all in one app. But that does degrade security model 
> somewhat, because running any user level apps there is opening the 
> attack surface a bit. 
>
> My suggestion is to learn the system you have first before adding all 
> kinds of extra security compromising software/baggage that you don't 
> really need. 
>
> > On my setup this works very well. This should be default!! 
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-devel+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-devel/9df72588-3840-4551-add1-44378cc0c377%40googlegroups.com.

Reply via email to