Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[META] Tails-like functionality in Qubes #2024

Closed
1 of 4 tasks
mfc opened this issue May 24, 2016 · 8 comments
Closed
1 of 4 tasks

[META] Tails-like functionality in Qubes #2024

mfc opened this issue May 24, 2016 · 8 comments
Labels
C: other P: default Priority: default. Default priority for new issues, to be replaced given sufficient information. privacy This issue pertains to data or information privacy through technological means. R: not applicable E.g., help/support requests, questions, discussions, "not a bug," not enough info, not actionable. T: enhancement Type: enhancement. A new feature that does not yet exist or improvement of existing functionality.

Comments

@mfc
Copy link
Member

mfc commented May 24, 2016

Just wanted to create a ticket for those interested to track Tails-like functionality in Qubes. This would include:

Are there additional functionalities in Tails not currently captured in these categories or the referenced tickets? Please share, or create tickets to track these differences.


mailing list thread that touches on the subject: https://secure-os.org/pipermail/desktops/2015-November/000015.html

@mfc mfc added T: enhancement Type: enhancement. A new feature that does not yet exist or improvement of existing functionality. help wanted This issue will probably not get done in a timely fashion without help from community contributors. labels May 24, 2016
@Jeeppler
Copy link

@mfc the whole point of tails is to be non-persistent how do you want to achieve this feature in Qubes OS? Where is the benefit for Qubes users over Whonix? What do you think about offering tails as disposable VM?

@adrelanos
Copy link
Member

I don't see any distinctive advantages gained by Tails in a Qubes VM in comparison to Qubes-Whonix.

Anyhow. There is value in having Tails boot in a Qubes HVM. So I can more conveniently boot Tails sometimes to look around rather than involving a second computer. Convenience improves productivity. Similarly having a Tails template for Qubes with full integration of Qubes tools would also simplify other things. (Non-desktop related stuff, file copy etc.)

Also for the sake of having diversity. Being made by a different developer community. Coming with different default applications. Perhaps convenient for previous users of Debian / Tails that now like to migrate to Qubes / Tails.

My question:

Generally speaking… Putting Qubes aside for a moment for the sake
of argument… Let’s suppose we have a Debian Live DVD. Then, from there start Whonix. Or Tails. How specifically would Tails be more amnesic than Whonix?

jmercier reply:

If both are running from a live cd, then (simply put) that would be
the same.

Source, the comment section of the blog post:

https://garlicgambit.wordpress.com/2016/04/22/how-to-run-tails-from-a-qubes-live-cd/

Let's go through the original argument.

Why would you want to run Tails from a Qubes live cd?

There are two main reasons for this:

By default Tails obscures a lot of uniquely identifying bits about
the system and the user. However Tails is mostly run on bare metal.
This is a recommended approach for good reasons. But this makes it
relatively easy to get access to uniquely identifying parts from the
hardware of the system. This can include (unique) serial numbers
from: the motherboard, cpu, videocard, memory, network card and bios.
It can even include the unique service tags from the original
equipment manufacturer (woops). Sophisticated attackers can use this
information to de-anonymize users. With virtualization you can
obscure and anonymize this information even more to minimize
information leaks.

As concluded above, Tails in a VM has no advantages over Whonix in a VM in this regard. Whether the host operating system is run from read-only media or not does not change anything about this.

Tails does not protect against a compromised endpoint. If attackers
can gain root access to a Tails system they can shutdown or
circumvent Tor to de-anonymize the user. One solution for this
problem is to separate the ‘workstation’ from the ‘Tor proxy’. With
virtualization it is easy to create such a setup. Whonix is a project
that already implements this idea and it is available for Qubes!

So
why not switch to Whonix? Well because Whonix is mainly aimed at
persistent installations, whilst Tails is not. We would argue that,
on top of all the security and privacy technologies, Tails’ main
strength is the fact that it is amnesiac or non-persistent. A reboot
should clean up all records of its use. In order to keep this
important property and get the benefits of virtualization you would
need to run Tails from a virtual environment which in itself is also
not persistent. One such virtual environment is the Qubes live cd.

a) Qubes Live plus Qubes-Whonix
b) Qubes Live plus Tails
-> persisted data after shutdown: a = b = 0 (*)

Otherwise please explain what and how Qubes-Whonix could possibly persist anything more than Tails?


(*)
Issues fixable by Qubes only:

Issues not possible to fix at either Whonix or Tails at the VM level, that are required to make Qubes Live comparable to Qubes-Whonix Live / Tails Live.

@mfc
Copy link
Member Author

mfc commented May 31, 2016

I agree it is very unclear to me what the difference is between a theoretical Tails-workstation and current Whonix-workstation. Because of this, I think #1969 is misdirected since once there is an updated Qubes Live USB image it will have Whonix integrated in it... unless there are specific functionalities of Tails that are not captured in Whonix (please share if these exist!).

and I agree that "Tails in Qubes" probably means (1) improving Qubes Live USB and (2) improving Whonix templates in Qubes.

I'm going to change this ticket to be a meta-ticket tracking implementing "Tails-like functionality" in Qubes, since that would probably be more useful.

@mfc mfc removed the C: templates label May 31, 2016
@mfc mfc changed the title Tails template [META] Tails-like functionality in Qubes May 31, 2016
@DrWhax
Copy link

DrWhax commented Jun 1, 2016

Hi,

As I see it, there are quite some differences between Whonix and Tails. So far, the direction seems to be, "Tails like functionality" which seems to mean, improving Whonix templates.

Correct me if i'm wrong but I think the differences here are:

  • Tails doesn't come with persistence enabled by default. (Amnesic feature)
  • Use Tails' Tor firewall rules in a separate VM. (this to provide the same UX)
  • Tails configuration has received more scrutiny over the years.

How to leverage Qubes:

  • DispVM's for Tails means we get Amnesic features by default!

There are probably more differences but I would have to use Whonix for that.

@andrewdavidwong
Copy link
Member

@DrWhax:

How to leverage Qubes:

  • DispVM's for Tails means we get Amnesic features by default!

As Patrick explained above, this is only part of the picture. There are two senses of "Tails-like functionality in Qubes":

  1. Amnesiac Torified VMs in persistent Qubes OS.
  2. Amnesiac Qubes OS containing Torified VMs.

"DispVMs for Tails" would only achieve 1, not 2. (And, arguably, the same or better could be achieved with Whonix VMs.)

But if 2 is ever created, I propose the name TaiQuWhonDo: The Amnesiac Incognito Qubes Whonix Desktop operating system. (Just kidding.)

andrewdavidwong added a commit that referenced this issue Jun 1, 2016
@Jeeppler
Copy link

Jeeppler commented Jun 2, 2016

TaiQuWhonDo I like the name ;-)

andrewdavidwong added a commit that referenced this issue Jun 7, 2016
@marmarek marmarek modified the milestone: Far in the future Jun 21, 2016
@andrewdavidwong andrewdavidwong added the privacy This issue pertains to data or information privacy through technological means. label Aug 10, 2016
@mfc mfc mentioned this issue Oct 17, 2017
@jpouellet
Copy link
Contributor

Another forensics concern to track/address if we want to go down this road:

@andrewdavidwong andrewdavidwong added C: other P: default Priority: default. Default priority for new issues, to be replaced given sufficient information. labels Aug 7, 2019
@andrewdavidwong
Copy link
Member

Closing this since we don't do meta issues anymore:

https://www.qubes-os.org/doc/issue-tracking/#projects

If needed, we can make a project for this instead, but it probably doesn't need one for now.

@andrewdavidwong andrewdavidwong closed this as not planned Won't fix, can't repro, duplicate, stale Aug 13, 2023
@andrewdavidwong andrewdavidwong added the R: not applicable E.g., help/support requests, questions, discussions, "not a bug," not enough info, not actionable. label Aug 13, 2023
@andrewdavidwong andrewdavidwong removed this from the Release TBD milestone Aug 13, 2023
@andrewdavidwong andrewdavidwong removed the help wanted This issue will probably not get done in a timely fashion without help from community contributors. label Aug 13, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
C: other P: default Priority: default. Default priority for new issues, to be replaced given sufficient information. privacy This issue pertains to data or information privacy through technological means. R: not applicable E.g., help/support requests, questions, discussions, "not a bug," not enough info, not actionable. T: enhancement Type: enhancement. A new feature that does not yet exist or improvement of existing functionality.
Projects
None yet
Development

No branches or pull requests

7 participants