-------- Original message --------From: Dominique <dominiqu...@gmail.com> Date: 
6/9/20  12:26  (GMT-05:00) To: qubes-users <qubes-users@googlegroups.com> 
Subject: [qubes-users] Re: How do you maximize your VM security? On Tuesday, 
June 9, 2020 at 11:26:22 AM UTC-4, fiftyfour...@gmail.com wrote:Hi all,I took a 
break from setting up my Qubes OS machine and now I'm looking to finish the job 
and actually settle in. I am familiar with the overall layout and functions of 
the OS as a whole, but want to shore up the security of my individual VMs, with 
Debian running everything except for dom0. I know that isolation should do most 
of the work, but if further hardening my VMs will add more hurdles for 
attackers while being of minimal cost to me, why not?For now, I plan on proper 
firewalling, activating apparmor, installing taskett-hardening, and reducing 
attack surfaces where possible.Specific question: how would one strip down 
non-app VMs (sys-net, sys-USB, sys-firewall, whonix-gw) to minimize their 
attack surfaces? Aside from common-sense hardening and operation of app VMs, 
these seem to be the most exposed and therefore most vulnerable.More generally: 
what steps have you taken to harden your VMs?

Hi,First step for me was to install the minimal template and use them instead 
of the complete template for service qubes (sys-net, sys-USB and sys-firewall). 
Information on minimal template can be found here: 
https://www.qubes-os.org/doc/templates/minimal/Second step for me was building 
and using the mirage firewall instead of sys-firewall. Information on mirage 
can be found here: https://github.com/mirage/qubes-mirage-firewall/Third step 
for me was random mac address and hostname. 
https://www.qubes-os.org/doc/anonymizing-your-mac-address/That are things that 
I do on all my qubes laptop installation. After that, you can play with 
firewall rules, apparmor and other things.I would love to see a way to add 
IDS/IPS in qubes easily but did not have time to even check if someone did try 
to add IDS/IPSHave fun!Dominique1st, I second all of this.2nd, I run a VPN off 
of the minimal template (technically a double vpn, but it's probably 
overkill)3rd, on my todo list, create a scratch template with even less than 
the minimal for these functions4th, only wired networking bc all the insecurity 
regarding wifi.5th, any applications I don't trust (like Zoom) I run off 
disposable vms.6th, don't have any hardware VMs running if you aren't actively 
using them7th, add a root password to all VMs8th, make sure your firewall 
disallows connections between VMs (granted this is qubes default)9th, add 
outbound firewall rules to each VM as appropriate10th, don't tell people your 
qubes configuration (I'm kinda fucking up that one right now :p)11th, use tor 
if you're seriously concerned about privacy (even though that double vpn was 
overkill, and this probably moreso)12th, use both DNSSec and DNS over TLS13th, 
test dns leak with regards to vpn14th, reply in line and don't top post... 
Okay, not security, just good manners15th, also strip down bios surface (remove 
possibilities of remote connections, disable any hardware you aren't likely to 
use, etc.)Codially, Emlay

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ad3b1c28-e980-4d0c-9517-8b18402f816do%40googlegroups.com.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5edfcd90.1c69fb81.a0909.78cc%40mx.google.com.

Reply via email to