Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upqubes_security_level service #6
Comments
marmarek
assigned
rootkovska
Mar 8, 2015
marmarek
added this to the Release 1 Beta 1 milestone
Mar 8, 2015
marmarek
added
enhancement
C: core
P: minor
labels
Mar 8, 2015
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
|
Modified by joanna on 14 Mar 2011 21:26 UTC |
marmarek
modified the milestones:
Release 1 Beta 2,
Release 1 Beta 1
Mar 8, 2015
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Mar 8, 2015
Member
Comment by joanna on 11 Apr 2011 12:20 UTC
Also present an option to enable VT-d.
Also, our installer should generate two grub entries:
- Qubes
- Qubes (IOMMU/VT-d enabled)
By default we should be booting without iommu (because it often causes problems with incompatible GPUs), but always display a warning when we figure out IOMMU is not supported or not enabled.
|
Comment by joanna on 11 Apr 2011 12:20 UTC Also, our installer should generate two grub entries:
By default we should be booting without iommu (because it often causes problems with incompatible GPUs), but always display a warning when we figure out IOMMU is not supported or not enabled. |
marmarek
added
P: major
and removed
P: minor
labels
Mar 8, 2015
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
|
Modified by joanna on 28 May 2011 09:04 UTC |
marmarek
modified the milestones:
Release 1 Beta 3,
Release 1 Beta 2
Mar 8, 2015
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Mar 8, 2015
Member
Comment by joanna on 25 Sep 2011 10:50 UTC
We should have a service called qubes_security_level that would be the last init.d service started in Dom0. This service's task would be to evaluate the level of security based on current platform config. Currently this would be just the availability of the VT-d. In the future we would add more criteria, such as:
- is also Interrupt Remapping enabled?
- is full screen for AppVMs allowed by guid or not?
- has the system been started using TPM-based trusted boot (Anti Evil Maid) or not?
- is the whole filesystem encrypted or not?
- etc...
Also, we should have a little app (or part of the qubes manager) that would be displaying an icon in the tray that would be representing the current security level (a number from 1-5, coloured from red to green/blue). When user clicks on the icon we should display a quick explanation what factors contributed to given security level.
|
Comment by joanna on 25 Sep 2011 10:50 UTC
Also, we should have a little app (or part of the qubes manager) that would be displaying an icon in the tray that would be representing the current security level (a number from 1-5, coloured from red to green/blue). When user clicks on the icon we should display a quick explanation what factors contributed to given security level. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
|
Modified by joanna on 25 Sep 2011 10:51 UTC |
marmarek
changed the title from
Detect when running without IOMMU/VT-d enabled
to
qubes_security_level service
Mar 8, 2015
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Mar 8, 2015
Member
Comment by joanna on 19 Oct 2011 08:59 UTC
This is currently tricky to implement, because we don't know how to implement "stickiness" of the variable that holds the level -- it should be possible to ensure that once the user "lowers" the security level, e.g. by booting the system with VT-d disabled, then the level will never get back to the previously high level.
So, currently we can just add some trivial indicator e.g. to Qubes Manager -- TBD.
|
Comment by joanna on 19 Oct 2011 08:59 UTC So, currently we can just add some trivial indicator e.g. to Qubes Manager -- TBD. |
marmarek
modified the milestones:
Release 2,
Release 1 Beta 3
Mar 8, 2015
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
|
Modified by joanna on 8 Oct 2012 09:23 UTC |
marmarek
modified the milestones:
Release 2 Beta 3,
Release 2
Mar 8, 2015
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
|
Modified by joanna on 12 Mar 2013 10:27 UTC |
marmarek
added
P: minor
and removed
P: major
labels
Mar 8, 2015
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
|
Modified by joanna on 1 Aug 2013 12:51 UTC |
marmarek
modified the milestones:
Release 3,
Release 2 Beta 3
Mar 8, 2015
marmarek
modified the milestones:
Release 4.0,
Release 3.0
May 27, 2015
TNTBOMBOM
referenced this issue
Dec 12, 2015
Closed
dom0 , OSError: [Errno 2] No such file or directory: '/var/lib/qubes/servicevms/dom0/apps.templates' #1491
TNTBOMBOM
referenced this issue
Jan 16, 2016
Open
qubes "VM didnt give resources back.." (Whonix appVM) #1643
andrewdavidwong
unassigned
rootkovska
Apr 21, 2016
This was referenced Jun 30, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
|
Now tracked as part of the #2134. |
marmarek commentedMar 8, 2015
Reported by joanna on 6 Apr 2010 17:10 UTC
...and display a warning to the user, that e.g. without IOMMU/VT-d there is no point of having a NetVM, as it cannot be securely isolated on a system without VT-d.
Migrated-From: https://wiki.qubes-os.org/ticket/6