On Wednesday, June 10, 2020 at 8:09:23 AM UTC-4, fiftyfour...@gmail.com 
wrote:
>
> On Wednesday, 10 June 2020 00:26:01 UTC+8, Dominique wrote:
>>
>> Hi,
>>
>> First step for me was to install the minimal template and use them 
>> instead of the complete template for service qubes (sys-net, sys-USB and 
>> sys-firewall). Information on minimal template can be found here: 
>> https://www.qubes-os.org/doc/templates/minimal/
>>
>> Second step for me was building and using the mirage firewall instead of 
>> sys-firewall. Information on mirage can be found here: 
>> https://github.com/mirage/qubes-mirage-firewall/
>>
>> Third step for me was random mac address and hostname. 
>> https://www.qubes-os.org/doc/anonymizing-your-mac-address/
>>
>> That are things that I do on all my qubes laptop installation. After 
>> that, you can play with firewall rules, apparmor and other things.
>>
>> I would love to see a way to add IDS/IPS in qubes easily but did not have 
>> time to even check if someone did try to add IDS/IPS
>>
>> Have fun!
>>
>> Dominique
>>
>> On Tuesday, June 9, 2020 at 11:26:22 AM UTC-4, fiftyfour...@gmail.com 
>> wrote:
>>>
>>> Hi all,
>>>
>>> I took a break from setting up my Qubes OS machine and now I'm looking 
>>> to finish the job and actually settle in. I am familiar with the overall 
>>> layout and functions of the OS as a whole, but want to shore up the 
>>> security of my individual VMs, with Debian running everything except for 
>>> dom0. I know that isolation should do most of the work, but if further 
>>> hardening my VMs will add more hurdles for attackers while being of minimal 
>>> cost to me, why not?
>>>
>>> For now, I plan on proper firewalling, activating apparmor, installing 
>>> taskett-hardening, and reducing attack surfaces where possible.
>>>
>>> Specific question: how would one strip down non-app VMs (sys-net, 
>>> sys-USB, sys-firewall, whonix-gw) to minimize their attack surfaces? Aside 
>>> from common-sense hardening and operation of app VMs, these seem to be the 
>>> most exposed and therefore most vulnerable.
>>>
>>> More generally: what steps have you taken to harden your VMs?
>>>
>>
> Hi Dominique,
>
> Thanks for the reply. So I take it you chose Mirage because a unikernel 
> firewall has a smaller attack surface compared to full-blown Linux? 
>
> I'm a newbie, so I'm not even sure if these are IDS/IPS, but I'm thinking 
> of installing the tried-and-true trio of rkhunter, lynis, chkrootkit.
>
> I see the point in changing your mac address (already did it myself), but 
> why the hostname as well? Since it's not covered in that link, did you just 
> edit the config files of the template?
>
> (Re-posted since I committed the cardinal sin of top posting) 
>

Hi

Changing the hostname is interesting especially for laptop. When you are 
connecting to any network, your hostname is sent with your MAC address to 
the DHCP server thus leaving a trace in the log of your presence on that 
network. Also, the sys-net hostname is very unique and stands out of a list 
of computer name like the default Windows computer name.

Concerning the IDS/IPS (Intrustion Detection System/Intrusion Prevention 
System) I would be interesting to analyzing the traffic with a qubes and 
being able to alert or even create firewall rules on alert at one point. 
This is probably a big projet to do!!!

And sorry for top posting, I am sending a lot of email and I am so used to 
click reply and start typing!!!

Regards,

Dominique


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7be2ea31-b26f-4426-9d2e-7e1f9ee80ba1o%40googlegroups.com.

Reply via email to