-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

On 01/07/16 00:03, Marek Marczykowski-Górecki wrote:
> On Thu, Jun 30, 2016 at 10:57:42PM +0100, Duncan Guthrie wrote:
>> Dear Qubes Users, I have been using Qubes OS for a couple of days
>> now. I own a Lenovo Thinkpad X200 and everything works fine,
>> including WiFi. However, I am concerned about this, because my
>> X200 has an Intel WiFi chipset, which I know uses proprietary
>> firmware. I am concerned about this because the firmware could be
>> malicious, so I think this is quite bad from a security
>> perspective. The more proprietary software, the worse security
>> you have, as has been shown many times. Since the hardware is
>> secret, it is possible that the WiFi chipset could be used to do
>> malicious actions without any way to tell. I am especially 
>> concerned about the firmware being in dom0, which has access to
>> the hardware.
> 
> WiFi card is assigned to NetVM and have no access to dom0. So even
> if its firmware is malicious, it shouldn't be a big problem. It may
> at most mess with your network traffic - which should be encrypted
> anyway for anything sensitive.
> 
> In practice the only firmware still needed in dom0, is the one for
> GPU (if applicable).
> 
I think this is a good idea in general, whether the firmware is free
software or proprietary software. However, there are certain wireless
chipsets (made by Atheros corporation) which work without a
proprietary firmware blob for WiFi, but don't for Bluetooth, so even
if they largely work without the proprietary program, the operating
system still loads some proprietary program not needed (most people
don't use Bluetooth at any rate). I own such a chipset on my desktop
computer; Debian works without any proprietary software at all, while
Tails loads firmware for the Bluetooth. What is the answer to this, do
you make exceptions for firmware only for wireless cards and GPUs? Or
do you just allow them all through.

Another thing I have read is that Linux-libre's deblob scripts don't
just get rid of firmware that is proprietary, it removes all binary
files disguised as source files (e.g. some binary file named
"something.h") and "obfuscated" driver sources (I believe that the 2D
nv driver has been accused of this). Would you consider at least
adapting the deblob scripts from Linux-libre to work for your kernel
to only allow select firmware through, for the most common computers?
Another option, like Debian (and, if I recall, Ubuntu to some extent,
although I have never installed Ubuntu), which I think would be even
better is to have a completely free kernel by default, then a separate
repository for firmware, which can be enabled in the installation
process. It would probably be considerably simpler than adapting the
deblob scripts to be quite selective, too. It wouldn't make Qubes
compliant with the Free Software Foundation's "Free Software
Distribution Guidelines", but I think that from a security perspective
it is better than including the proprietary 'blobs' by default, and is
a balance between usability of obscure hardware and security of dom0
(it never hurts). What do you think of this proposal?

- ----
Thanks for your reply, it was really helpful for allowing me to
understand more about your security policies.

D.


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=WZ6b
-----END PGP SIGNATURE-----

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/60a2c0c9-8eed-62c0-c6fd-9cd22d46a88d%40posteo.net.
For more options, visit https://groups.google.com/d/optout.

Reply via email to