Re: [qubes-devel] Qubes R4.2 EOL: No upgrade path for installations with Windows and QWT

2024-04-13 Thread jmake2 via qubes-devel
Apr 13, 2024, 15:26 by a...@qubes-os.org:

> On 4/13/24 8:15 AM, jmake2 via qubes-devel wrote:
>
>> Apr 13, 2024, 06:46 by a...@qubes-os.org:
>>
>>> On 4/12/24 4:50 AM, Gerhard Weck wrote:
>>>
 [...]

 - Things may look different, if an attacker could, via the Xen PV drivers, 
 break out of a Windows VM with QWT and compromise Xen, and therefore Qubes 
 itself. In this case, usage of a Windows VM with the insecure QWT may be 
 too risky in many, but not all circumstances. So far, I found no 
 information, if such a scenario is possible at all. What is the extent of 
 possible compromises of the Xen PV drivers - is it just local to the VM or 
 could it reach into Qubes itself? It would be helpful if this could be 
 clarified somehow.

 [...]

>>>
>>> This was already clearly addressed in QSB-091:
>>>
 Impact
 ---

 If the Xen Project's Windows PV Drivers were compromised at build time,
 all Windows qubes that have Qubes Windows Tools (QWT) installed may also
 be compromised. If the drivers were not compromised at build time, then
 there is no known vulnerability.

 Dom0 is not affected, even though the `qubes-windows-tools` package is
 installed in dom0, since neither the dom0 package build process nor dom0
 itself interprets these driver files. Rather, the purpose of this
 package is merely to make the driver files available to the Windows
 qubes in which QWT are installed.

>>>
>>> In other words, only the Windows VMs using QWT are potentially at risk, not 
>>> dom0, Xen, or Qubes OS itself.
>>>
>>
>>
>> @adw , thank you. So, QWT does not directly affect security of dom0 nor 
>> other non-windows qubes.
>>
>> Please also tell if QWT is deprecated, as unman kind of said, or not?
>>
>
> This is also addressed in QSB-091:
>
>> At the time of writing, the Xen Project has not published replacement
>> binaries signed by a Microsoft-approved key. The process for doing this
>> has changed since the last version of Windows PV Drivers was released,
>> and we have no information as to whether or when new signed binaries
>> will be available. [2]
>>
>> In order to avoid similar problems in the future, we are working on a
>> more permanent solution regarding the need for signed PV drivers in QWT.
>> In the meantime, we will replace the `qubes-windows-tools` package with
>> a dummy package containing only warning text.
>>
>
> https://www.qubes-os.org/news/2023/07/27/qsb-091/
>

Well, the link does not say the QWT is deprecated in any way. The only problem 
is that Qubes OS was not building some drivers using in QWT from sources but 
used Xen's binaries that are signed with Microsoft-approved key. Now Microsoft 
deprecated this way of signing, that's all. Deprecated signing approach by 
Microsoft have nothing to do with deprecation of available Xen drivers sources, 
nor QWT itself, if I am getting it correctly (I hope).

So, am I getting it right that QWT is not deprecated? I was afraid for a moment.
As it was discussed previously, the QWT package can be build from secure and 
available sources and put to R4.2+ repos with different signatures, including 
secure self-signed but not Microsoft-approved key. Requirement to allow 
self-signed drivers is not perfect, but still a way better solution than 
current situation, to my understanding.

I support the opinion that R4.1 cannot be EOLed before there would be a version 
of Qubes OS that is capable to restore and boot such windows qubes with 
valuable users' data in them.


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-devel+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-devel/NvNA3sG--3-9%40tutanota.com.


Re: [qubes-devel] Qubes R4.2 EOL: No upgrade path for installations with Windows and QWT

2024-04-13 Thread Andrew David Wong
On 4/13/24 8:15 AM, jmake2 via qubes-devel wrote:
> Apr 13, 2024, 06:46 by a...@qubes-os.org:
> 
>> On 4/12/24 4:50 AM, Gerhard Weck wrote:
>>
>>> [...]
>>>
>>> - Things may look different, if an attacker could, via the Xen PV drivers, 
>>> break out of a Windows VM with QWT and compromise Xen, and therefore Qubes 
>>> itself. In this case, usage of a Windows VM with the insecure QWT may be 
>>> too risky in many, but not all circumstances. So far, I found no 
>>> information, if such a scenario is possible at all. What is the extent of 
>>> possible compromises of the Xen PV drivers - is it just local to the VM or 
>>> could it reach into Qubes itself? It would be helpful if this could be 
>>> clarified somehow.
>>>
>>> [...]
>>>
>>
>> This was already clearly addressed in QSB-091:
>>
>>> Impact
>>> ---
>>>
>>> If the Xen Project's Windows PV Drivers were compromised at build time,
>>> all Windows qubes that have Qubes Windows Tools (QWT) installed may also
>>> be compromised. If the drivers were not compromised at build time, then
>>> there is no known vulnerability.
>>>
>>> Dom0 is not affected, even though the `qubes-windows-tools` package is
>>> installed in dom0, since neither the dom0 package build process nor dom0
>>> itself interprets these driver files. Rather, the purpose of this
>>> package is merely to make the driver files available to the Windows
>>> qubes in which QWT are installed.
>>>
>>
>> In other words, only the Windows VMs using QWT are potentially at risk, not 
>> dom0, Xen, or Qubes OS itself.
>>
> 
> 
> @adw , thank you. So, QWT does not directly affect security of dom0 nor other 
> non-windows qubes.
> 
> Please also tell if QWT is deprecated, as unman kind of said, or not?
> 

This is also addressed in QSB-091:

> At the time of writing, the Xen Project has not published replacement
> binaries signed by a Microsoft-approved key. The process for doing this
> has changed since the last version of Windows PV Drivers was released,
> and we have no information as to whether or when new signed binaries
> will be available. [2]
> 
> In order to avoid similar problems in the future, we are working on a
> more permanent solution regarding the need for signed PV drivers in QWT.
> In the meantime, we will replace the `qubes-windows-tools` package with
> a dummy package containing only warning text.

https://www.qubes-os.org/news/2023/07/27/qsb-091/

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-devel+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-devel/ac93e4c5-e279-404b-aff3-914a3c699271%40qubes-os.org.


Re: [qubes-devel] Qubes R4.2 EOL: No upgrade path for installations with Windows and QWT

2024-04-13 Thread jmake2 via qubes-devel
Apr 13, 2024, 06:46 by a...@qubes-os.org:

> On 4/12/24 4:50 AM, Gerhard Weck wrote:
>
>> [...]
>>
>> - Things may look different, if an attacker could, via the Xen PV drivers, 
>> break out of a Windows VM with QWT and compromise Xen, and therefore Qubes 
>> itself. In this case, usage of a Windows VM with the insecure QWT may be 
>> too risky in many, but not all circumstances. So far, I found no 
>> information, if such a scenario is possible at all. What is the extent of 
>> possible compromises of the Xen PV drivers - is it just local to the VM or 
>> could it reach into Qubes itself? It would be helpful if this could be 
>> clarified somehow.
>>
>> [...]
>>
>
> This was already clearly addressed in QSB-091:
>
>> Impact
>> ---
>>
>> If the Xen Project's Windows PV Drivers were compromised at build time,
>> all Windows qubes that have Qubes Windows Tools (QWT) installed may also
>> be compromised. If the drivers were not compromised at build time, then
>> there is no known vulnerability.
>>
>> Dom0 is not affected, even though the `qubes-windows-tools` package is
>> installed in dom0, since neither the dom0 package build process nor dom0
>> itself interprets these driver files. Rather, the purpose of this
>> package is merely to make the driver files available to the Windows
>> qubes in which QWT are installed.
>>
>
> In other words, only the Windows VMs using QWT are potentially at risk, not 
> dom0, Xen, or Qubes OS itself.
>


@adw , thank you. So, QWT does not directly affect security of dom0 nor other 
non-windows qubes.

Please also tell if QWT is deprecated, as unman kind of said, or not?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-devel+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-devel/NvN0s7D--3-9%40tutanota.com.


Re: [qubes-devel] Qubes R4.2 EOL: No upgrade path for installations with Windows and QWT

2024-04-13 Thread Gerhard Weck
Thank you for clarifying this!

So there is not much sense in blocking QWT, as Windows qubes are 
notoriously insecure. Using a compromised QWT will just make an already bad 
situation even worse. Using Windows under Qubes poses a risk anyhow, but 
this risk is mitigated a lot thanks to the security functions of Qubes.  
Using Windows outside Qubes is, in my opinion, suicide, especially when you 
regard the latest problems like the Midnight Blizzard's hack.

Andrew David Wong schrieb am Samstag, 13. April 2024 um 08:46:44 UTC+2:

> On 4/12/24 4:50 AM, Gerhard Weck wrote:
> > [...]
> > 
> > - Things may look different, if an attacker could, via the Xen PV 
> drivers, 
> > break out of a Windows VM with QWT and compromise Xen, and therefore 
> Qubes 
> > itself. In this case, usage of a Windows VM with the insecure QWT may be 
> > too risky in many, but not all circumstances. So far, I found no 
> > information, if such a scenario is possible at all. What is the extent 
> of 
> > possible compromises of the Xen PV drivers - is it just local to the VM 
> or 
> > could it reach into Qubes itself? It would be helpful if this could be 
> > clarified somehow.
> > 
> > [...]
> > 
>
> This was already clearly addressed in QSB-091:
>
> > Impact
> > ---
> > 
> > If the Xen Project's Windows PV Drivers were compromised at build time,
> > all Windows qubes that have Qubes Windows Tools (QWT) installed may also
> > be compromised. If the drivers were not compromised at build time, then
> > there is no known vulnerability.
> > 
> > Dom0 is not affected, even though the `qubes-windows-tools` package is
> > installed in dom0, since neither the dom0 package build process nor dom0
> > itself interprets these driver files. Rather, the purpose of this
> > package is merely to make the driver files available to the Windows
> > qubes in which QWT are installed.
>
> In other words, only the Windows VMs using QWT are potentially at risk, 
> not dom0, Xen, or Qubes OS itself.
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-devel+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-devel/47b97b64-b27f-4e8b-96e0-48e9c97254d4n%40googlegroups.com.


Re: [qubes-devel] Qubes R4.2 EOL: No upgrade path for installations with Windows and QWT

2024-04-13 Thread Andrew David Wong
On 4/12/24 4:50 AM, Gerhard Weck wrote:
> [...]
> 
> - Things may look different, if an attacker could, via the Xen PV drivers, 
> break out of a Windows VM with QWT and compromise Xen, and therefore Qubes 
> itself. In this case, usage of a Windows VM with the insecure QWT may be 
> too risky in many, but not all circumstances. So far, I found no 
> information, if such a scenario is possible at all. What is the extent of 
> possible compromises of the Xen PV drivers - is it just local to the VM or 
> could it reach into Qubes itself? It would be helpful if this could be 
> clarified somehow.
> 
> [...]
> 

This was already clearly addressed in QSB-091:

> Impact
> ---
> 
> If the Xen Project's Windows PV Drivers were compromised at build time,
> all Windows qubes that have Qubes Windows Tools (QWT) installed may also
> be compromised. If the drivers were not compromised at build time, then
> there is no known vulnerability.
> 
> Dom0 is not affected, even though the `qubes-windows-tools` package is
> installed in dom0, since neither the dom0 package build process nor dom0
> itself interprets these driver files. Rather, the purpose of this
> package is merely to make the driver files available to the Windows
> qubes in which QWT are installed.

In other words, only the Windows VMs using QWT are potentially at risk, not 
dom0, Xen, or Qubes OS itself.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-devel" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-devel+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-devel/a6af30cf-6c9e-4192-a37c-19a57b1df1c0%40qubes-os.org.