[qubes-devel] Re: GVT-g Discussion

2019-11-30 Thread pixel fairy
This comes up often, and i suspect qubes-os is the inspiration for the xen 
version of it, but it also opens up a big can of attack surface. maybe 
after splitting the guivm off from dom0?

On Friday, November 22, 2019 at 2:02:14 AM UTC-8, Dylanger Daly wrote:
>
> Will the Qubes team consider enabling the use of GVT-g so we can enjoy 
> hardware accelerated graphics?
>
> After upgrading to DDR4 Memory I've noticed a significant increase in 
> performance, I assume this is because of the many, many memory copies 
> taking place, GVT-g should lighten the load.
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-devel+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-devel/49dcc8d8-18ec-4b47-8329-f0fcb84581b6%40googlegroups.com.


Re: [qubes-devel] Qubes Outgoing Firewalll...

2019-11-30 Thread Outback Dingo


On Wednesday, November 13, 2019 at 5:16:11 AM UTC+7, Steve Coleman wrote:
>
> On 2019-11-12 12:38, 'Jonas' via qubes-devel wrote: 
>
> > I would like to enable opensnitch firewall on every VM by default. 
>
> > what do you think about this??? 
>
>
The daemon is implemented in Go and needs to run as root in order to 
interact with the Netfilter packet ... WTF ... runs away screaming ..

 

> To be frank, it may look pretty, but it would be a big waste of CPU and 
> memory resources while providing absolutely no additional security. 
>
> - A firewall that runs inside the AppVM is easily circumvented by any 
> application or process running in that VM, thus no real security. 
>
> - You already have a real and secure Firewall by default sitting in the 
> sys-firewall VM, so why add an additional drain on your memory and CPU 
> resources. Why not learn to use what you already have available? 
>
> - You already have the means to see what you AppVM's are connecting to 
> if that is what you are after. You can simply run an app like etherape 
> (wireshark, or tcpdump) in the sys-firewall VM and see everything being 
> connected to all in one app. But that does degrade security model 
> somewhat, because running any user level apps there is opening the 
> attack surface a bit. 
>
> My suggestion is to learn the system you have first before adding all 
> kinds of extra security compromising software/baggage that you don't 
> really need. 
>
> > On my setup this works very well. This should be default!! 
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-devel+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-devel/9df72588-3840-4551-add1-44378cc0c377%40googlegroups.com.