Hi Alex,

Alex wrote :
On 11/03/2016 11:37 AM, Simon wrote:
If you use keepassx you may want to use its auto-type feature, which is
designed exactly to prevent password theft by keylogger-only or
clipboard-monitor-only malware. Auto type works by typing random parts
of the password via simulated keystrokes and other parts via
copy-and-paste, making the life of password stealing malware writers
miserable ;)


Do you mean that KeepassX auto-type feature works in a cross-AppVM way?

In one dedicated, networkless AppVM I have Keepass (sadly started some time ago with the new DB version which, AFAIK, is still not supported by KeepassX :( ), in another network-enabled AppVM I have the browser (or any other software for that matters).

As per my understanding there is no way for the Keepass(X) software to emulate keystrokes on the browser's interface, unless I missed something very important in Qubes' architecture.

The only way it should be possible would be to store Keepass(X)'s database alongside with the browser, but in this case I see no substantial benefits over using the browser's own password management DB (unless we are talking about an application without similar feature, like handling SSH password for instance).

Besides it is incredibly annoying to operate this way. I am not
some prime target of the NSA ^^, and I doubt many of the people using
qubes will be... So you want to be safe, but you still want the
convenience... The right way is to block the link, unless it refers to
a white-listed domain for this identity.

No, the right way is to propose people an option in the browser's
right-click menu offering them to open this link in an untrusted VM
(similar to the "Send to another VM" or "Open in a disposable VM" option
in the file manager).

I agree with you that, IMHO, the right-click followed by 'A',
Ctrl+Shift+C, Alt-tab, Ctrl+T, Ctrl+Shift+V, Ctrl+V and finally Enter
"shortcut" sequence to achieve the same task currently could and should
be improved in terms of usability for Qubes to reach a wider audience.

But I do like the fact that I have to make so many mistakes in order to
copy my data from the "pr0n" VM to the "work-boss" VM... But if I have
to copy a pr0n link from a 4chan greentext to another pr0n tab I only
have to ctrl+c / ctrl+v like I used to do with plain fedora. I'd
strongly disagree with any simplification of inter-vm generic clipboard
sharing. I'd agree with some easier facilities for centralized (trusted, without networking) PasswordDatabaseVM. But I'll doubt I'll be using it;
I like to keep a "porn" keepass database on the porn VM, many work
keepassx db on their respective VM, and so on, to further avoid having a
simple "autotype" open the wrong URL.

I'm not talking about clipboard sharing by itself, which I also consider to be good as it is now (unless maybe the minor fact that it overwrites the default common shortcut to paste something in a terminal, but that's really not big deal).

What I'm talking here is about a user-friendly way to open an untrusted link from a sensitive AppVM into an untrusted AppVM, this should actually not involve the clipboard at all but be a simple, classical right-click operation.

I do not think there is really any risk of wrong manipulation here: personally I do not remember having mistakenly right-clicked on a file and opened it in a disposable VM or sent it to another VM when I just wanted to open it locally using a simple left-click.

The only real risk of wrong manipulation is to directly open the untrusted link in the sensitive VM. The current situation does not help against that, actually it even encourage to do such wrong practice by making it more difficult to open a link in a different AppVM.

I do use i3wm as my window manager, and have only 1 monitor with the
vertical-split layout; all the others are tabbed, and it works great. It
may well emulate the concept of "dom0 browser".

Thank you for this confirmation. I never used such windows manager myself, but this was indeed my assumption. I hope Mara will have the opportunity to check this :) !

One should not do any change to their Whonix AppVM, so everyone uses the
same, and an app running in the AppVM, no matter how malicious it is,
cannot access anything outside of the AppVm without having to break Xen
isolation first and cannot apply any modification of it which will
survive an AppVM restart.

So I'm quite confident that there is no easy way to remotely distinguish
two Whonix AppVM instances or identify one.
Which is nice, if your threat model is trying to identify the AppVM and
not the user behind it - which is usually false.

While identification of the client device is one of the way of
identifying people it's not the only way, and usually the goal is not
the identification of the client device itself. For an easy example,
that's why spies in hollywood movies connect to the net from public WiFi
hotspots, hotels, airports, but not from home.

From my understanding, there is actually two level of correlation when you want to convict someone:

1) You demonstrate that it was the same machine which was used for all incriminated actions.
2) You demonstrate the link between the suspect and the machine.

In your statement, for n incriminated actions, you would need to demonstrate n times the involvement of the suspect which can be very hard, if not impossible.

It is far easier to demonstrate that the same computer has been used for all of the n incriminated actions (either actively by putting some tracking bug on it or passively by correlating various information for instance), no matter if it is using some public or private Internet access, and then show a single proof demonstrating that this computer is actually owned and used solely by the suspect.

As I stated in other messages, it's deceptively easy to get carried on
to pure paranoia. Model your threats before shopping for the right
tinfoil hat.

I do not use tinfoil hats, these are lies invented by governments to better spy on us. I'm telling the truth: this has been scientifically proven!

http://scienceblogs.com/startswithabang/2009/04/03/weekend-diversion-do-tinfoil-h/

"Statistical evidence suggests the use of helmets may in fact enhance the government’s invasive abilities. We speculate that the government may in fact have started the helmet craze for this reason."

It is good to see serious researchers taking great care of defending our privacy, ;) !

Panopticlick and online-activities tracking is yet another wide subject.
I invite you to check the answer I wrote there on this subject:
https://security.stackexchange.com/a/138525/32746
Thank you for the link, it's been an interesting reading.

As a StackExchange user, I take this as an opportunity to share my hope that the proposal to open a section dedicated to Qubes will eventually reach all criterion and open:

https://area51.stackexchange.com/proposals/98519/qubes-os

I think this would be a really great place to share information and build a good quality and more practical knowledge base and encourage the readers of this mailing list to commit :).

So let me sum this thread up: I'd have to severely cripple my browsing
experience to hide from some unspecified tracking but then I'd love to
simplify the UI around the browser, thus paving the way for more
inter-vm mistakes... Mmm I think I'll pass :D

Personally if I use several AppVM for browsing it is not against tracking (I have the same IP anyway), but as what I consider to be a minimum security level (even if only very few OSs propose this currently).

The threat for me is not unspecified:

1. Create a malicious website, or hack a vulnerable small site to make it store some malicious content. 2. Post a link claiming there is a interesting article on some secured forum or mailing list. 3. Get access to the visitors computers content, including their credentials to this more secured forum / mailing list + potentially other resources.

Such threat is far from being NSA-level.

AFAIK, Qubes OS is the only libre and production-ready OS allowing to effectively fight against such threat... as long as you take the habit to not mix all of your surfing in one single AppVM.

Regards,
Simon.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0b4d7bce59b1c33238ba81d66ba89454%40whitewinterwolf.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to