Groups | Search | Server Info | Login | Register


Groups > gnu.hurd.help > #362

Re: Combining Hurd and Qubes OS for security reasons? Possible?

Path csiph.com!usenet.blueworldhosting.com!feeder01.blueworldhosting.com!news.glorb.com!usenet.stanford.edu!not-for-mail
From Olaf Buddenhagen <olafbuddenhagen@gmx.net>
Newsgroups gnu.hurd.help
Subject Re: Combining Hurd and Qubes OS for security reasons? Possible?
Date Thu, 24 Dec 2015 03:33:01 +0100
Lines 69
Approved help-hurd@gnu.org
Message-ID <mailman.690.1451085201.843.help-hurd@gnu.org> (permalink)
References <CAB=Lj3T9dABDCnfiPFmui45WdZSVvpGs6rMX=PBVR6O94Es-Ug@mail.gmail.com>
NNTP-Posting-Host lists.gnu.org
Mime-Version 1.0
Content-Type text/plain; charset=us-ascii
X-Trace usenet.stanford.edu 1451085202 6015 208.118.235.17 (25 Dec 2015 23:13:22 GMT)
X-Complaints-To action@cs.stanford.edu
To help-hurd@gnu.org
Envelope-to help-hurd@gnu.org
Mail-Followup-To help-hurd@gnu.org
Content-Disposition inline
In-Reply-To <CAB=Lj3T9dABDCnfiPFmui45WdZSVvpGs6rMX=PBVR6O94Es-Ug@mail.gmail.com>
User-Agent Mutt/1.5.24 (2015-08-30)
X-Provags-ID V03:K0:oKnJA7b8F6/o8Oqzj1eP8qSuAv5vi7EmYH9g73NAAHtMV+5djpl IZLnz/T03T59J/999qqA7MWePQexoZeX9aTnOIH+vJ5Pg1zDnHDG4ovUI/FiTHeobpXtx64 y1quMTFE5o+vqS6kq9ncJu6MuVfS5OeHxu6x5zOebHnuOxg50ayiaByXJ6SP2na4+g00H1S kuCB6taIIhdfpfEWuVEjQ==
X-UI-Out-Filterresults notjunk:1;V01:K0:3gtdDqTk9dY=:dVqDpvMW7oOBZro6a1w+Ot Da/Pw/4JUJvb9nDoDXdNADdhY61MytPX1wARVGCufo/NLcOPo3g3/noFtiTAB2bKpYvCubHXj UoI65CSGzkaKbelsYRl9r0Ii5PTENxeXWhy64Z1emRjsUaHvlzsZ0iYvLkfya3hMSPQ5LoFEr cMkji1PQhgz1xjZiaXQOZ/d3JsdsqMzGNscBt+uH0Bi9m8ObyNIhmWDOcLFO+tAOzAnPbLOsd r7IOI8WwCkGqL2T/ZgdyyQazdM0uLQueRRtVASOD1J8gCuO9ZwH9FZVmspx5RRo9Q6JgWWyfI ckmIoS1afJsLdH1AVYJxkxwEGieZP7waXU7dqzIxw5ViVwI4vjJIKxEH14poLBGPLi2QtsIdB ZH1OtIVjF1Q7lXnXNxWz7dR0U2Kb/aB1DMTK67VT36psusZSkNOeZ6bD8IshrVp9k0NHXnB5V vpYjX7D9Fg0lh/smLr3OhDg3XeSLwnm6OvKtxwvBozmpikW4JlvNTMMnN8pclolnoLo3gR3IF TdqcnnhVgTvtbrnNYl0sQnzw1a3lu++pHIMdn73RzWmaCXol5r5IR/Q79sGML5De7+o2UUm7x KMmuFvhY4szXIxehlZQUQDVh5JX03M6kHsYK2ODHi8fAbEIL/tUWW6ZM6xQfWwMTufyJuQMwQ 31h4s6jpwgHoTLgrMxJ35UB8Z/nzNDGnB8HXawWv8cYlJ5hQ4zRA8ke+weipEMBdMei+aljHT wrIrxXxcic91wNxLoDRxBoNqfml2LUc9RPJKG/zw/CPM2i/u7FRgtXgO2FQ=
X-detected-operating-system by eggs.gnu.org: GNU/Linux 2.2.x-3.x [generic]
X-Received-From 212.227.15.15
X-BeenThere help-hurd@gnu.org
X-Mailman-Version 2.1.14
Precedence list
List-Id Users list for the GNU Hurd <help-hurd.gnu.org>
List-Unsubscribe <https://lists.gnu.org/mailman/options/help-hurd>, <mailto:help-hurd-request@gnu.org?subject=unsubscribe>
List-Archive <http://lists.gnu.org/archive/html/help-hurd>
List-Post <mailto:help-hurd@gnu.org>
List-Help <mailto:help-hurd-request@gnu.org?subject=help>
List-Subscribe <https://lists.gnu.org/mailman/listinfo/help-hurd>, <mailto:help-hurd-request@gnu.org?subject=subscribe>
Xref csiph.com gnu.hurd.help:362

Show key headers only | View raw


Hi,

On Fri, Dec 18, 2015 at 07:26:53PM +0100, David Renz wrote:

> I'm new to this mailing list, but already have many years of Linux
> experience behind me and have read a lot about GNU Hurd, which gave me
> the impression that it offers a quite high level of security due to
> its limited attack surface.

Well, it isn't specifically geared towards that -- but in theory (i.e.
minus bugs), it should be somewhat safer than monolithic systems
nevertheless.

> E. g., there are (not only on theoretical presentations, but also in
> the real world) so-called 'ACPI'- or 'BIOS-Rootkits', which are
> capable of manipulating Windows as well as Linux systems. Since Hurd
> follows a different approach of accessing hardware components, I often
> wondered whether this could make it resistent against those kind of
> rootkits, but I can't really estimate this considering several facts
> about those. (Maybe others would be able to guess whether a Hurd-based
> system could be manipulated by any kind of malicious code hiding in
> (flashable) firmware components [this problem also affects PCI
> devices' firmware and other components...].)

I don't think it makes a difference. Running the ACPI interpreter in a
separate address space would isolate faults caused by bugs in the
interpreter -- however, that's not how these ACPI rootkits work. Rather,
they just plainly tell the interpreter to execute harmful operations. I
don't believe there is any way to protect against that: the interpreter
*has* to execute dangerous operations to actually control the hardware.
While the most obvious invalid operations could be catched, there is no
way it could catch *all* harmful operations. (Not even theoretically,
unless it fully understands the hardware -- in which case ACPI would be
pointless anyways...)

OTOH, I'm not sure protecting about this specific kind of exploits would
even make a difference. The BIOS has full control over the hardware
anyways -- using this specific attack just makes it somewhat easier to
hook into the OS functionality at best AIUI.

> Wouldn't it potentially increase one's security by many times, if one
> would be able to let (e. g.) Debian Hurd as a template VM on top of a
> Qubes OS system? I'm sure it would be really difficult to put this
> idea into practice, but basically this should be possible to do, or am
> I missing a fact which make this be impossible?

Well, you could certainly do that -- though I'm not sure there is
actually much point to that... The Hurd architecture naturally lends
itself to implementing container solutions. (Hypothetically at least --
as for things actually implemented, the subhurd mechanism is all we
actually have there...)

Now on monolithic systems, containers are a major step backwards in
terms of security compared to full virtualisation, because the
monolithic kernel is responsible for all security enforcement again,
with no fault isolation whatsoever. (While with full virtualisation, the
hypervisor and guest OS can provide additional security layers.) But on
the Hurd it's different: the confinement mechanisms for containers can
be implemented in isolated processes -- thus theoretically offering a
similar level of security as full virtualisation, while still having
overhead not significantly larger than other container solutions...

This is an area I have been considering very interesting to explore
further in the Hurd for many years (see
http://tri-ceps.blogspot.de/2007/10/advanced-lightweight-virtualization.html
) -- long before the recent Docker-induced container boom...

-antrik-

Back to gnu.hurd.help | Previous | Next | Find similar


Thread

Re: Combining Hurd and Qubes OS for security reasons? Possible? Olaf Buddenhagen <olafbuddenhagen@gmx.net> - 2015-12-24 03:33 +0100

csiph-web