On 2/11/19 9:39 AM, Dupéron Georges wrote:
These features have a high security cost, and I prefer to disable them.

* Deny /etc/qubes-rpc/policy/qubes.InputMouse . Rationale: BadUSB can
   use the mouse to open a terminal and copy-paste existing characters to
   build a malicious command.

I'm not sure about this. A mouse cursor that is blind to screen content and its own position is very limited.

* Deny /etc/qubes-rpc/policy/qubes.VMShell for DispVMs. Rationale: I
   want to use DispVMs for their non-persistent aspect, but want to still
   be able to store confidential data in their base private.img.

Have a look at https://github.com/tasket/Qubes-VM-hardening

It provides some of the protection that dispVMs have, while letting data persist in the private volume. It also gives the user control over which files can remain, sha256 checks, and protects against common methods for malware escalation and persistence.

* Set "Default DispVM" to "(none)" for most VMs. Rationale: see
   previous point. Most VMs have a specific purpose and do not need to
   open third-party documents in a DispVM anyway.
* Prevent focus stealing (there are several discussions about this on
   GitHub, but no perfect solution so far).
* Let the installation create sys-usb and reboot immediately (USB is
   still enabled in Dom0 until the next reboot).

Focus-stealing is a real issue that I would like to see addressed. FWIW, KDE will prevent focus-stealing most of the time, but at the expense of having any automatic focus.


Some other features are covered by the Security Guides (NetVM = none,
firewall, Anti Evil Maid, possibly disable passwordless sudo)

Are there any other settings that one should change after installation
to improve Qube's security?

I would suggest looking at Apparmor. Years ago it had problems working correctly with Firefox but has supposedly improved since then.

I would also move most VM functions to Debian. Despite recent drama over apt, its still more secure overall than Fedora. The latter is uniquely deprived of proper repository signatures to satisfy Red Hat's marketing department... its been a long-term thorn in Qubes' side.


--

Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/07a979a9-e780-686c-4e25-aaf92be36ca9%40posteo.net.
For more options, visit https://groups.google.com/d/optout.

Reply via email to