Groups | Search | Server Info | Login | Register
| Path | csiph.com!usenet.blueworldhosting.com!feeder01.blueworldhosting.com!news.glorb.com!usenet.stanford.edu!not-for-mail |
|---|---|
| From | Olaf Buddenhagen <olafbuddenhagen@gmx.net> |
| Newsgroups | gnu.hurd.help |
| Subject | Re: Combining Hurd and Qubes OS for security reasons? Possible? |
| Date | Thu, 24 Dec 2015 03:33:01 +0100 |
| Lines | 69 |
| Approved | help-hurd@gnu.org |
| Message-ID | <mailman.690.1451085201.843.help-hurd@gnu.org> (permalink) |
| References | <CAB=Lj3T9dABDCnfiPFmui45WdZSVvpGs6rMX=PBVR6O94Es-Ug@mail.gmail.com> |
| NNTP-Posting-Host | lists.gnu.org |
| Mime-Version | 1.0 |
| Content-Type | text/plain; charset=us-ascii |
| X-Trace | usenet.stanford.edu 1451085202 6015 208.118.235.17 (25 Dec 2015 23:13:22 GMT) |
| X-Complaints-To | action@cs.stanford.edu |
| To | help-hurd@gnu.org |
| Envelope-to | help-hurd@gnu.org |
| Mail-Followup-To | help-hurd@gnu.org |
| Content-Disposition | inline |
| In-Reply-To | <CAB=Lj3T9dABDCnfiPFmui45WdZSVvpGs6rMX=PBVR6O94Es-Ug@mail.gmail.com> |
| User-Agent | Mutt/1.5.24 (2015-08-30) |
| X-Provags-ID | V03:K0:oKnJA7b8F6/o8Oqzj1eP8qSuAv5vi7EmYH9g73NAAHtMV+5djpl IZLnz/T03T59J/999qqA7MWePQexoZeX9aTnOIH+vJ5Pg1zDnHDG4ovUI/FiTHeobpXtx64 y1quMTFE5o+vqS6kq9ncJu6MuVfS5OeHxu6x5zOebHnuOxg50ayiaByXJ6SP2na4+g00H1S kuCB6taIIhdfpfEWuVEjQ== |
| X-UI-Out-Filterresults | notjunk:1;V01:K0:3gtdDqTk9dY=:dVqDpvMW7oOBZro6a1w+Ot Da/Pw/4JUJvb9nDoDXdNADdhY61MytPX1wARVGCufo/NLcOPo3g3/noFtiTAB2bKpYvCubHXj UoI65CSGzkaKbelsYRl9r0Ii5PTENxeXWhy64Z1emRjsUaHvlzsZ0iYvLkfya3hMSPQ5LoFEr cMkji1PQhgz1xjZiaXQOZ/d3JsdsqMzGNscBt+uH0Bi9m8ObyNIhmWDOcLFO+tAOzAnPbLOsd r7IOI8WwCkGqL2T/ZgdyyQazdM0uLQueRRtVASOD1J8gCuO9ZwH9FZVmspx5RRo9Q6JgWWyfI ckmIoS1afJsLdH1AVYJxkxwEGieZP7waXU7dqzIxw5ViVwI4vjJIKxEH14poLBGPLi2QtsIdB ZH1OtIVjF1Q7lXnXNxWz7dR0U2Kb/aB1DMTK67VT36psusZSkNOeZ6bD8IshrVp9k0NHXnB5V vpYjX7D9Fg0lh/smLr3OhDg3XeSLwnm6OvKtxwvBozmpikW4JlvNTMMnN8pclolnoLo3gR3IF TdqcnnhVgTvtbrnNYl0sQnzw1a3lu++pHIMdn73RzWmaCXol5r5IR/Q79sGML5De7+o2UUm7x KMmuFvhY4szXIxehlZQUQDVh5JX03M6kHsYK2ODHi8fAbEIL/tUWW6ZM6xQfWwMTufyJuQMwQ 31h4s6jpwgHoTLgrMxJ35UB8Z/nzNDGnB8HXawWv8cYlJ5hQ4zRA8ke+weipEMBdMei+aljHT wrIrxXxcic91wNxLoDRxBoNqfml2LUc9RPJKG/zw/CPM2i/u7FRgtXgO2FQ= |
| X-detected-operating-system | by eggs.gnu.org: GNU/Linux 2.2.x-3.x [generic] |
| X-Received-From | 212.227.15.15 |
| X-BeenThere | help-hurd@gnu.org |
| X-Mailman-Version | 2.1.14 |
| Precedence | list |
| List-Id | Users list for the GNU Hurd <help-hurd.gnu.org> |
| List-Unsubscribe | <https://lists.gnu.org/mailman/options/help-hurd>, <mailto:help-hurd-request@gnu.org?subject=unsubscribe> |
| List-Archive | <http://lists.gnu.org/archive/html/help-hurd> |
| List-Post | <mailto:help-hurd@gnu.org> |
| List-Help | <mailto:help-hurd-request@gnu.org?subject=help> |
| List-Subscribe | <https://lists.gnu.org/mailman/listinfo/help-hurd>, <mailto:help-hurd-request@gnu.org?subject=subscribe> |
| Xref | csiph.com gnu.hurd.help:362 |
Show key headers only | View raw
Hi, On Fri, Dec 18, 2015 at 07:26:53PM +0100, David Renz wrote: > I'm new to this mailing list, but already have many years of Linux > experience behind me and have read a lot about GNU Hurd, which gave me > the impression that it offers a quite high level of security due to > its limited attack surface. Well, it isn't specifically geared towards that -- but in theory (i.e. minus bugs), it should be somewhat safer than monolithic systems nevertheless. > E. g., there are (not only on theoretical presentations, but also in > the real world) so-called 'ACPI'- or 'BIOS-Rootkits', which are > capable of manipulating Windows as well as Linux systems. Since Hurd > follows a different approach of accessing hardware components, I often > wondered whether this could make it resistent against those kind of > rootkits, but I can't really estimate this considering several facts > about those. (Maybe others would be able to guess whether a Hurd-based > system could be manipulated by any kind of malicious code hiding in > (flashable) firmware components [this problem also affects PCI > devices' firmware and other components...].) I don't think it makes a difference. Running the ACPI interpreter in a separate address space would isolate faults caused by bugs in the interpreter -- however, that's not how these ACPI rootkits work. Rather, they just plainly tell the interpreter to execute harmful operations. I don't believe there is any way to protect against that: the interpreter *has* to execute dangerous operations to actually control the hardware. While the most obvious invalid operations could be catched, there is no way it could catch *all* harmful operations. (Not even theoretically, unless it fully understands the hardware -- in which case ACPI would be pointless anyways...) OTOH, I'm not sure protecting about this specific kind of exploits would even make a difference. The BIOS has full control over the hardware anyways -- using this specific attack just makes it somewhat easier to hook into the OS functionality at best AIUI. > Wouldn't it potentially increase one's security by many times, if one > would be able to let (e. g.) Debian Hurd as a template VM on top of a > Qubes OS system? I'm sure it would be really difficult to put this > idea into practice, but basically this should be possible to do, or am > I missing a fact which make this be impossible? Well, you could certainly do that -- though I'm not sure there is actually much point to that... The Hurd architecture naturally lends itself to implementing container solutions. (Hypothetically at least -- as for things actually implemented, the subhurd mechanism is all we actually have there...) Now on monolithic systems, containers are a major step backwards in terms of security compared to full virtualisation, because the monolithic kernel is responsible for all security enforcement again, with no fault isolation whatsoever. (While with full virtualisation, the hypervisor and guest OS can provide additional security layers.) But on the Hurd it's different: the confinement mechanisms for containers can be implemented in isolated processes -- thus theoretically offering a similar level of security as full virtualisation, while still having overhead not significantly larger than other container solutions... This is an area I have been considering very interesting to explore further in the Hurd for many years (see http://tri-ceps.blogspot.de/2007/10/advanced-lightweight-virtualization.html ) -- long before the recent Docker-induced container boom... -antrik-
Back to gnu.hurd.help | Previous | Next | Find similar
Re: Combining Hurd and Qubes OS for security reasons? Possible? Olaf Buddenhagen <olafbuddenhagen@gmx.net> - 2015-12-24 03:33 +0100
csiph-web