[HN Gopher] What Is Qubes OS?
       ___________________________________________________________________
        
       What Is Qubes OS?
        
       Author : LinuxBender
       Score  : 137 points
       Date   : 2022-07-09 16:47 UTC (6 hours ago)
        
 (HTM) web link (www.qubes-os.org)
 (TXT) w3m dump (www.qubes-os.org)
        
       | duxuev wrote:
       | I remember seeing that Edward Snowden uses it daily. Wonder if
       | that's still the case.
        
       | sacrosanct wrote:
       | Anyone use this as a daily driver? I tried installing it and it
       | crashed on first run. Should have looked at the list of
       | compatible laptop models first. It's a bit overkill for my needs.
       | My threat model doesn't require me to spawn a disposable Fedora
       | VM just to read a PDF document. I just open a PDF in Google Docs.
        
         | f38zf5vdt wrote:
         | I have been using it for over 5 years for all personal things
         | like email, banking, and paying bills. Once you find good
         | hardware for the OS, it runs very well, but you either need a
         | lot of memory or to close each VM as soon as you're done with
         | it and run only one-two VMs at a time. I would say minimum of
         | 16 GB RAM with 32-64 GB preferred.
        
         | shaky-carrousel wrote:
         | I do. I use it in a Librem 15v4, with 32GB of RAM.
         | 
         | It's not only about threats, it's pretty convenient. I do all
         | my dd operations, feeling confident a mistake won't wipe out my
         | HDD. I have a work vm and a personal vm (and many more), and I
         | can share full screen on my work vm knowing that all personal
         | windows are hidden.
         | 
         | I have files and programs organized by vms. I can try
         | installing new applications in a disposable vm knowing well
         | that all their files will be wiped out when I close the vm.
        
         | polotics wrote:
         | Works fine on an older ex-windows laptop, repurposed for
         | throwaway VMs, trying things... Could not get it to run on a
         | 2015 MacBook Pro, would be using it more if I had.
        
         | eduction wrote:
         | I have for about five years. Install has been fine for me
         | across three laptops (various ThinkPads), with the caveat that
         | I chose models known to work well with linux (you're booting
         | into fedora, which runs Xen as dom0). Also, the one time I had
         | to do a lot of work was when I bought a newly released version
         | of a laptop; a few months later I upgraded to a later version
         | of Qubes and it installed normally.
         | 
         | There is an up front investment in figuring out how to
         | partition your computer use/apps into VMs and then setting up
         | the VMs. If you're not already a Linux user there is also the
         | usual learning curve of switching to Linux (most qubes users
         | use mostly Linux vms, windows takes more work to get going, I
         | have windows 10 working but it took some effort).
         | 
         | I absolutely love the disposable VM model. I do all my web
         | surfing (except some financial sites) in disposable VMs and
         | cannot fathom going back to downloading and executing untrusted
         | code (JavaScript) outside a dispVM. Similarly, I cannot imagine
         | opening documents from untrusted third parties outside a vm of
         | some sort. Even software I don't fully trust (e.g. Zoom, bluRay
         | ripping software) I like to run in disposable VMs or at least
         | their own dedicated vm.
         | 
         | Qubes is like any other specialized tool - it's worth investing
         | the time if what it offers (security and privacy) is something
         | you especially value. Having seen supposedly exotic and
         | advanced threats become more commonplace over the last 20 years
         | I think we all will end up using systems to some extent similar
         | to Qubes, at least inspired by Qubes. Some of what's not in
         | your threat model today will be, eventually. The only question
         | is how much.
         | 
         | In practical terms, it is in some ways like going from having
         | one computer to having a network of computers. You do become
         | something of a sysadmin. There is some pain there especially up
         | front but I am at the point where I am expert enough that the
         | ongoing time and pain investment is quite minimal.
         | 
         | More than anything, I feel completely exposed on other OSes. I
         | wish other operating systems (like macOS) would steal the best
         | ideas from qubes. For example, let people open files in
         | disposable VMs when they want to, and cause this to happen by
         | default for downloaded files, and by default have people surf
         | the web in the rough, more seamless equivalent of a disposable
         | VM, possibly with some carve outs for ease of use (like make it
         | almost transparent, with some red flag, to move downloads out
         | of the browser vm, and do likewise with uploads). Also, Qubes
         | has "vaults," which are just VMs with no internet where you put
         | your most sensitive files; I put basically all my files there
         | because they really don't need live internet. You could
         | translate this on a "regular" OS into some kind of area that's
         | extra protected from other processes somehow. For example
         | unprompted access to files in the vault would require explicit
         | authorization, and files in the vault could not cause network
         | connections by default. Something along those lines.
        
           | ChikkaChiChi wrote:
           | I couldn't agree more. Secure computing adoption requires
           | easy usability.
           | 
           | We helped push technical adoption through skeuomorphic design
           | patterns, but left engineers to figure out how to educate
           | users on permissibility. That's a failure on us as an
           | industry. We should be building to keep people safe from the
           | dangers we all know about FIRST, then and only then should we
           | build the access controls to allow access to other resources
           | and interoperability.
           | 
           | I feel like chromiumos is the closest we have to a mainstream
           | solution for this, but a combination of Nix and Qubes would
           | be even better.
        
         | i_like_waiting wrote:
         | Writing from Qubes right now. x230 with 16gb ram and it runs
         | just fine. Still figuring some things out tho.
        
         | mysterydip wrote:
         | I tried probably half a year ago, and it installed fine, but I
         | just couldn't wrap my head around how to use it right.
        
           | nubb wrote:
           | same here. the entry bar is really high on qubes.
        
         | minimalist wrote:
         | Daily driving for years now. Only thing to really keep in mind
         | is having sufficient RAM. Otherwise, it's great for
         | development. You can keep TemplateVMs for all of your
         | development environments and tear them up and down, duplicate
         | them, assign to a VPN, etc. Not good if you need GPU
         | acceleration for anything, but some people have worked on GPU
         | passthrough.
        
           | jamal-kumar wrote:
           | Yeah 16gigs+ is what you want here. Not rare in modern
           | computers.
        
             | Sakos wrote:
             | Using Qubes over a year on my personal laptop, I found 16GB
             | to be too fussy and I constantly had to fiddle with VM RAM
             | sizes. I would recommend 32GB.
        
         | [deleted]
        
         | jamal-kumar wrote:
         | I have in the past before I became bound to doing windows-
         | compatible development. It was actually really great. I didn't
         | hate it at all.
         | 
         | I liked the ability to run multiple linux distros and a windows
         | 7 VM for stuff that needed that, but scrubbing PDFs I think is
         | one of those underrated things considering how much malware
         | comes in through those. Like I would rather not do that in a
         | docker container of all broken condoms. Right now I just have a
         | seperate computer to take care of that. I'd probably use qubes
         | if I had an intel laptop as my daily driver again.
         | 
         | Oh and the only other thing was laptop battery life. Maybe an
         | hour and a half tops.
        
       | iou wrote:
       | Conceptually, I love it. I used it since about 2016 until last
       | year, but I had to record some video and use stuff like OBS and
       | it just became impossible (with my skill level) to get working.
       | 
       | I abandoned and went back to Fedora, which is odd as I'd stuck
       | with it through lots of other NVIDIA crap issues and such.
       | 
       | Hopefully adoption increases and one day I can use in a workplace
       | setting.
        
       | imagineerschool wrote:
       | QubesOS is my favourite technology existing today.
       | 
       | Daily driver on desktop and laptop.
       | 
       | Feels like home.
       | 
       | ^ My highest praise.
        
       | neodymiumphish wrote:
       | Maybe this isn't the best place to ask this, but I'll try anyway:
       | 
       | I'm a consultant involved in cybersecurity who often has to build
       | and run VMs to either test out software, run things in sandbox,
       | or connect to TOR from a VM I'll never use again.
       | 
       | Having said that, I currently use Windows with VMWare
       | Workstation, but I find it frustrating and would prefer something
       | that's less frustrating and feels more built-in.
       | 
       | Is there a solution that anyone would recommend for this kind of
       | thing? Internal networks, Windows and Linux sandboxes, etc. I use
       | Microsoft office products regularly, and my workstation (Dell
       | Inspiron with an i9, 64GB ram, 2tb SSD) is connected to a
       | thunderbolt 4 dock with 2 1440 monitors. I'd prefer for a Windows
       | VM to have passthrough to the monitors and be able to interact
       | with the host OS via that VM, so I can still share my screen
       | during meetings and while coordinating efforts.
        
         | eointierney wrote:
         | NixOS or Guix both allow one to fire up a vm based on a
         | specification very easily, and positively encourage interation.
         | The learning curve is steep but rewarding.
        
         | Dracophoenix wrote:
         | I don't known of this works with all your criteria, but you
         | might want to go with UnRaid or Proxmox or a Type 1 hypervisor
         | like vSphere/ESXi or Xen.
        
           | neodymiumphish wrote:
           | Maybe Fedora with Xen is the route I should try, assuming I
           | can give the Windows VM full GPU pass-through and use it as a
           | "primary" machine. I need to be able to screenshare almost
           | daily via Zoom.
        
             | hsbauauvhabzb wrote:
             | I use vbox regularly on a Linux host, it's not seamless but
             | it works okay. I have custom built vm images with packer
             | that do things like enable auto login and disable
             | screensaver (these don't matter on a vm, your host is where
             | they should happen). I don't need gpu so the vbox drivers
             | suffice, but if I did I would probably consider getting a
             | quadro or something and doing pci pass through (not even
             | sure if vbox supports this)
             | 
             | As a cautionary though, vms are a good boundary but not a
             | comprehensive one. If your threat model includes execution
             | of 0day exploits (malware analysis or browser exploit
             | chains) that can breach hypervisor perimeters you shouldn't
             | be doing anything sensitive from the host. RDP is better,
             | but iirc there are some case studies of execution on the
             | rdp client.
        
             | Dracophoenix wrote:
             | GPU Passthrough can be solved with LookingGlass
             | (https://looking-glass.io/) if you just want a solve that
             | particular problem. I'm not sure how well it works on a
             | laptop but if you have a dedicated graphics card (e.g.
             | Nvidia) you should theoretically be able to get it working
             | the way you want. I'm sorry for the lack of elegant all-in-
             | one packages. I too wish for an Excalibur of VM solutions.
        
           | tryauuum wrote:
           | I don't get the distinction between type 1 and type 2.
           | 
           | E.g. xen is type 1 and KVM is type 2. But at the end of the
           | day it's a Linux kernel in both cases that runs the virtual
           | machines, so what's the point of distinction?
        
             | transpute wrote:
             | It's about reducing the size and attack surface of the
             | most-privileged code which runs in the system, e.g. moving
             | code out of the kernel, making hypervisor/VMM smaller,
             | nested VMs, hardware enclaves. This video covers some of
             | the changes over the last decade, including Xen and
             | Bromium, https://youtube.com/watch?v=bNVe2y34dnM
        
             | simcop2387 wrote:
             | It's what runs above the vms that is the distinction. For
             | xen it has its own kernel instead of running Linux as the
             | hypervisor and host system. Xen still uses Linux typically
             | as the domain zero as it calls it for doing control and
             | setup but it doesn't necessarily have full access to all
             | the hardware on its own.
        
         | hnarn wrote:
         | You don't really mention specifically what you find
         | "frustrating" about VMWare Workstation so it's hard to know on
         | what criteria to give a response.
         | 
         | I don't know how "built in" it can be considered but I've used
         | LXD a bit and since it now supports VMs as well I'm guessing
         | you could define VMs in yaml in advance and "easily" (depending
         | on your definition) tear down and re-deploy VMs with
         | preconfigured network settings etc. Vagrant should also work
         | for this with a Virtualbox or VMware backend (paid feature).
         | 
         | What exactly do you mean when you say that the VM should be
         | able to "interact with the host OS", isn't that exactly what
         | you don't want and why you're running a VM in the first place?
        
           | neodymiumphish wrote:
           | I'd like the ability to drop files to a VM from another VM,
           | like shared folders in Workstation.
           | 
           | My frustrations with VMWare usually revolve around network
           | connectivity issues. My internal or NAT networks often fail
           | to give the guest VMs the expected connectivity.
        
             | yjftsjthsd-h wrote:
             | You work in cybersecurity and want _more_ exposure between
             | the host and the guest? You have a very different risk
             | tolerance than I would in your shoes
        
         | tssva wrote:
         | If you just have a need for isolating Windows applications have
         | you tried the Windows Sandbox functionality built-in to Windows
         | 10 Pro and Enterprise version? https://docs.microsoft.com/en-
         | us/windows/security/threat-pro...
        
       | dang wrote:
       | Related:
       | 
       |  _Qubes OS: A reasonably secure operating system_ -
       | https://news.ycombinator.com/item?id=30776103 - March 2022 (97
       | comments)
       | 
       |  _Qubes OS 4.1.0 has been released_ -
       | https://news.ycombinator.com/item?id=30215210 - Feb 2022 (1
       | comment)
       | 
       |  _Ask HN: Qubes OS or just separate VMs for separating work and
       | private files?_ - https://news.ycombinator.com/item?id=29537961 -
       | Dec 2021 (6 comments)
       | 
       |  _Qubes OS 4.1 RC2_ -
       | https://news.ycombinator.com/item?id=29402767 - Dec 2021 (1
       | comment)
       | 
       |  _Qubes OS 4.1-rc1 has been released_ -
       | https://news.ycombinator.com/item?id=28856957 - Oct 2021 (5
       | comments)
       | 
       |  _Qubes-Lite with KVM and Wayland_ -
       | https://news.ycombinator.com/item?id=26378854 - March 2021 (48
       | comments)
       | 
       |  _Ask HW: Qubes OS alternative on LXD containers_ -
       | https://news.ycombinator.com/item?id=25562208 - Dec 2020 (21
       | comments)
       | 
       |  _Ask HN: Would it be possible to reimplement Qubes OS but
       | lighter?_ - https://news.ycombinator.com/item?id=20622850 - Aug
       | 2019 (2 comments)
       | 
       |  _Joanna Rutkowska leaves Qubes OS, joins Golem_ -
       | https://news.ycombinator.com/item?id=18300345 - Oct 2018 (68
       | comments)
       | 
       |  _Introducing the Qubes U2F Proxy_ -
       | https://news.ycombinator.com/item?id=17958219 - Sept 2018 (2
       | comments)
       | 
       |  _Qubes OS 4.0 has been released_ -
       | https://news.ycombinator.com/item?id=16699900 - March 2018 (39
       | comments)
       | 
       |  _Qubes Air: Generalizing the Qubes Architecture_ -
       | https://news.ycombinator.com/item?id=16255251 - Jan 2018 (65
       | comments)
       | 
       |  _Qubes OS: A reasonably secure operating system_ -
       | https://news.ycombinator.com/item?id=15734416 - Nov 2017 (144
       | comments)
       | 
       |  _Reasonably Secure Computing in the Decentralized World_ -
       | https://news.ycombinator.com/item?id=15566563 - Oct 2017 (44
       | comments)
       | 
       |  _Toward a Reasonably Secure Laptop_ -
       | https://news.ycombinator.com/item?id=14743238 - July 2017 (100
       | comments)
       | 
       |  _"Paranoid Mode" Compromise Recovery on Qubes OS_ -
       | https://news.ycombinator.com/item?id=14218504 - April 2017 (14
       | comments)
       | 
       |  _Tor at the Heart: Qubes OS_ -
       | https://news.ycombinator.com/item?id=13272076 - Dec 2016 (1
       | comment)
       | 
       |  _Qubes OS Begins Commercialization and Community Funding
       | Efforts_ - https://news.ycombinator.com/item?id=13069615 - Nov
       | 2016 (24 comments)
       | 
       |  _Qubes OS 3.2 has been released_ -
       | https://news.ycombinator.com/item?id=12604417 - Sept 2016 (30
       | comments)
       | 
       |  _Xen exploitation part 3: XSA-182, Qubes escape_ -
       | https://news.ycombinator.com/item?id=12232932 - Aug 2016 (5
       | comments)
       | 
       |  _Security challenges for the Qubes build process_ -
       | https://news.ycombinator.com/item?id=11801093 - May 2016 (17
       | comments)
       | 
       |  _Qubes OS 3.1 has been released_ -
       | https://news.ycombinator.com/item?id=11260857 - March 2016 (44
       | comments)
       | 
       |  _Qubes OS will ship pre-installed on Purism's security-focused
       | Librem 13 laptop_ - https://news.ycombinator.com/item?id=10736516
       | - Dec 2015 (109 comments)
       | 
       |  _Finally, a 'Reasonably-Secure' Operating System: Qubes R3_ -
       | https://news.ycombinator.com/item?id=10654193 - Dec 2015 (1
       | comment)
       | 
       |  _Converting untrusted PDFs into trusted ones: The Qubes Way
       | (2013)_ - https://news.ycombinator.com/item?id=10538888 - Nov
       | 2015 (5 comments)
       | 
       |  _Enhancing Qubes with Rumprun unikernels_ -
       | https://news.ycombinator.com/item?id=10518842 - Nov 2015 (5
       | comments)
       | 
       |  _Critical Xen bug in PV memory virtualization code_ -
       | https://news.ycombinator.com/item?id=10471912 - Oct 2015 (80
       | comments)
       | 
       |  _Qubes - Secure Desktop OS Using Security by
       | Compartmentalization_ -
       | https://news.ycombinator.com/item?id=8428453 - Oct 2014 (49
       | comments)
       | 
       |  _Introducing Qubes 1.0 ( "a stable and reasonably secure desktop
       | OS")_ - https://news.ycombinator.com/item?id=4472403 - Sept 2012
       | (59 comments)
       | 
       |  _Qubes: an open source OS with strong security for desktop
       | computing_ - https://news.ycombinator.com/item?id=2645170 - June
       | 2011 (16 comments)
       | 
       |  _Review: Qubes OS Beta 1 -- a new and refreshing approach to
       | system security_ - https://news.ycombinator.com/item?id=2504274 -
       | May 2011 (1 comment)
       | 
       | * The Linux Security Circus: On GUI isolation* -
       | https://news.ycombinator.com/item?id=2477667 - April 2011 (47
       | comments)
       | 
       |  _Qubes Beta 1 has been released (strong desktop security OS)_ -
       | https://news.ycombinator.com/item?id=2439096 - April 2011 (3
       | comments)
       | 
       |  _Qubes Architecture - actual security-oriented OS_ -
       | https://news.ycombinator.com/item?id=1796384 - Oct 2010 (1
       | comment)
       | 
       |  _Open source Qubes OS is ultra secure_ -
       | https://news.ycombinator.com/item?id=1249857 - April 2010 (7
       | comments)
       | 
       |  _Introducing Qubes OS_ -
       | https://news.ycombinator.com/item?id=1246990 - April 2010 (20
       | comments)
        
       | [deleted]
        
       | mumphster wrote:
       | Used extensively by Mullvad VPN for a lot of their infrastructure
       | 
       | https://mullvad.net/en/blog/2022/6/15/mullvad-is-now-continu...
        
         | cpach wrote:
         | Not really for infrastructure though? Still neat.
        
       | jacooper wrote:
       | My main problem with QubesOS is GPU acceleration. Using any
       | intensive app is a chore because its so slow, and I Also game on
       | Linux.
       | 
       | But In general I don't think its for me anyway, I'm comfortable
       | with my current Fedora 36 Workstation setup.
        
         | mrtweetyhack wrote:
        
       | rkagerer wrote:
       | I was reading about Device Isolation but there's still something
       | I'm not clear on:
       | 
       | Does the OS claim to prevent partially-trusted PCI devices linked
       | to one VM from accessing memory of another VM? If so, how's that
       | done?
       | 
       | I understand by default the hypervisor resets a device when it's
       | moved from one VM to another, which would mitigate an evil device
       | driver in the former from impacting the latter. But that doesn't
       | protect from isolation breaches caused by evil [persistent]
       | firmware.
       | 
       | I thought PCI cards have DMA access to all the system's memory
       | space, unless you happen to have a server-type motherboard with a
       | "smart PCIe bridge that can be programmed to perform address
       | translation and access restrictions"
       | (https://superuser.com/a/988179). Is such hardware more common
       | now? Or does Qubes rely on all hardware you plug into it being
       | trustworthy?
        
         | simcop2387 wrote:
         | The iommu device is present on nearly all systems these days,
         | even consumer ones. Intel calls it vt-d. The big issue is the
         | device groupings that are setup by the firmware, and down
         | stream pcie bridges. It's become more common because it's the
         | only way to secure thunderbolt ports
        
           | wtallis wrote:
           | Yep, IOMMU support used to be one of those features Intel
           | used for product segmentation, eg. disabling it on the -K
           | overclockable CPUs while leaving it enabled on the
           | counterparts with locked multipliers. Thunderbolt is what
           | forced them to stop playing that game.
        
       ___________________________________________________________________
       (page generated 2022-07-09 23:00 UTC)