[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] [tor-dev] Porting Tor Browser to the BSDs
On 2015-04-14 1:05 pm, Apple Apple wrote:
I'm not too familiar with Whonix. May I ask what it does exactly to
protect
the system from a malicious actor with root level access to the
"gateway"
machine?
Dave's response addresses this. The point is not to absolutely isolate
the Whonix-Gateway where the Tor process is. Although, the
Whonix-Gateway does force its own connections through Tor, but not
secure against root-privileged malware.
Rather, the point is for your user machine (Whonix-Workstation) to be
securely isolated from reaching the clearnet, getting your real IP or
MAC address, etc.
You don't want the Tor process to be in the same security domain as the
user applications, since something malicious or misbehaving can simply
bypass it in one shot. Tails puts them both in the same general security
domain, so Tor protection can be bypassed and then it is game over.
Additionally is there any analysis or guidance on the safe hardware and
software configuration of virtual machines from the Whonix project?
As you may be aware, virtual machines are not a security product in and
of
themselves and they are certainly not magic.
The reality of this is somewhat different with Qubes.
This is why I launched the Qubes + Whonix project last year.
The security strength of Qubes VM isolation goes meaningfully beyond
typical VMs.
More info: https://www.whonix.org/wiki/Qubes
Do you suppose that it may be the case that malicious software has a
harder
time gaining root privileges on Tails than breaking out of a badly
configured virtual machine?
I believe it is probably generally harder to break out of a virtual
machine than root a Linux distro, like Tails, because hypervisors have a
more limited attack surface compared to a full monolithic OS.
If you use Qubes, then it is infinitely harder to root the host system.
Do not forget that hypervisor software has bugs too and generally has
unrestricted access to the host machine.
Right. But hypervisors are more minimal than a full bloated monolithic
Linux OS with hundreds of millions of lines of code, so naturally less
general attack surface exists to exploit.
For a usable system, Qubes currently goes the furthest with secure host
isolation.
I'm also working to push even further towards building even stronger
security + anonymity systems in the future.
May I also ask if Whonix addresses the other key feature of Tails which
is
ensuring that there will be no forensic evidence left behind after
usage?
Not at this time.
However, with disk encryption, deleting VMs after usage, and overwriting
disk space, this same anti-forensics effect can be accomplished with
Whonix.
WhonixQubes
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk