[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Introducing xB Machine - The Secure Virtual Workstation
- To: or-talk@xxxxxxxxxxxxx
- Subject: Introducing xB Machine - The Secure Virtual Workstation
- From: Arrakis <arrakistor@xxxxxxxxx>
- Date: Fri, 10 Aug 2007 02:29:31 -0500
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-talk-outgoing@xxxxxxxx
- Delivered-to: or-talk@xxxxxxxx
- Delivery-date: Fri, 10 Aug 2007 03:31:57 -0400
- Dkim-signature: a=rsa-sha1; c=relaxed/relaxed; d=gmail.com; s=beta; h=domainkey-signature:received:received:message-id:date:from:user-agent:mime-version:to:subject:content-type:content-transfer-encoding; b=lOutstAxHGw7YAO8Rw2RWjsor+t3R0FBv2QCktESClpMe2pfcTR6q1lIwEmuQcqtcq9ttkesMdypgIe8gihcQ4rS18F7O6T6AmIpdc9Zqnjz9w5jq4FvDi703Y3veVMFl46zLLjfLMC3iVG4yvi/0yRg9+TkqS5o4p/7+mOZ+L8=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=beta; h=received:message-id:date:from:user-agent:mime-version:to:subject:content-type:content-transfer-encoding; b=hop8BGGPXJL+qNcAQmAlSbDfL00ZzzBKu9CCP+oQ2U+vMT4TSJwCMavVsL/61gvWK8287QeyX0FqQhxpjhY+B6e3CBOuaDxpQswTyWWDa2Oz0zU2PX5oP6gEZV18yD6AQOKMjW3649erYMK0RLNnARMv+kkzKUBLNjgXhPatYmo=
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
- User-agent: Thunderbird 2.0.0.6 (Windows/20070728)
xB Machine v0.2.2 DEVELOPMENT PRE-RELEASE(370MB)
DOWNLOAD HERE:
http://update.xerobank.com/beta/xBVM-0.02.2.zip
xB Machine is a virtual machine built on the Gentoo platform, and is
designed to provide a strong IP leak-resistant system and network
design, hardened security against local attacks, and access to the Tor
network and XeroBank network. The functional use of the software is for
secure and anonymous communications and financial transactions.
The effect for the end user is that they can use the internet
anonymously and view rich media such as Flash, in addition to the
protection of a relatively hardened and well-featured operating system.
xB Machine can run on VMWare and QEMU.
xB Machine conforms to the Portable Privacy framework:
- Portability
- Trustworthiness
X - Source Code
- License
- Fail Securely
- Imputed Privacy
- Elegance
- Appealing
- Intuitive
- Easy to Use
- Self-Contained
X - Informative of Status
- Transparency
Source-code, design spec, and security spec is forthcoming. The license
is currently TESLA, but it is expected to become HESSLA or GPL as the
project develops.
The following list is inclusive, not exhaustive.
The current features are as follows:
- Firewalled NIC
- Segmented program partition from userdata filesystem
- Loop AES encrypted userdata filesystem
- Host system integrity check
- Remote encrypted filesystem mounting via WebDavFS/SSHFS
- Proxy autoconfiguration script for selecting the network used.
- Self-Destruct sequence to destroy AES key, and then data wipe of
encrypted user partition.
- Local Exploit Protections (GrSecurity, stack protection, few suids,
and more)
- Support for Tor, xB Plus, xB Pro/Premium. Future support for xB Onion
- Firefox, customized with addons and configurations for speed and
security options. (PrefBar, AdBlock Plus, DOM disabled, Pipelining, etc)
- Thunderbird customized with addons and configurations for speed and
security options. (Enigmail, DOM disabled, Pipelining, etc)
- Pidgin w/ OTR plugin for access to SILC, AIM, MSN, Y!, ICQ, etc. OTR
plugin secures the chat with AES encryption, and uses DH key exchanges
for perfect forward secrecy.
- Generic text editor and image viewer. These will likely be upgraded in
future releases.
Future features:
- PGP keysigned auto-update system
- LiveCD functionality
- xdm to be respected
- Mac Address changing (broken under VMWare)
Risks:
- Programs spying on network setup
- Programs sending rogue packets
Main Threat Vectors:
- OpenVPN
- Firefox
- Thunderbird
- Pidgin
- etc
Questions, comments, and suggestions are appreciated.
Regards,
Steve Topletz