Skip to content

Use a more secure OS as the default template for app qubes #9332

@adrelanos

Description

@adrelanos

The problem you're addressing (if any)

Qubes OS is marketed as "a reasonably secure operating system", leading users to expect comprehensive security hardening across all aspects of the system. This includes a hardened default browser and other Template hardening. However, the current default templates, particularly for default App Qubes, often include software with suboptimal security (and privacy) settings. This creates a disconnect between user expectations and the out-of-the-box experience.

Here are some examples. Quote Is there a reason Firefox needs to have vulnerable insecure settings in the templates? and Is Firefox really an appropriate default browser for Qubes?:

  • Firefox comes configured with worst privacy settings

  • When I first installed Qubes and I saw Firefox was preloaded I did assume it would have default security setting to be more secure out of the box due to the nature of the system. It was kind of shock to me that it was just setup like a straight download off Firefox.

  • why the hell is Firefox allowed to be the default browser on a privacy/security OS when every time I launch it it wants to call all of its friends back home? Literally all of them, even its grandma.

It is currently not possible to address this issue in Debian, Fedora Templates, because of the related Qubes FAQ: What is Qubes’ attitude toward changing guest distros?. The policy of respecting distribution policy is in direct conflict with Qubes making changes for customization (selected default installed packages), usability (Qubes tools integrations) and security hardening.

Example Qubes tickets which can currently not be implemented because of this policy.

This was confirmed by @marmarek in #8730 (comment).

As you can see, in both cases we in fact did not include them, and in the first case it's even explicitly discussed if that wouldn't be against what Debian is.

Fork in this context only means to have for example a Template based on Qubes Debian template, with a distinct name, where security-hardening by default would be permissible without being in contradicting with respecting upstream Linux distribution policy. No other gigantic steps (such as forking all of Debian archive packages.debian.org, re-building all the Debian archive are suggested.

The solution you'd like

  • A) Adopting an existing security-focused Linux distribution as the base if any suitable exists; or
  • B) A fork of a base distribution by Qubes for the purpose of security-hardening it by default and use it by default.

This new template would:

  • Have security-optimized default settings for browsers and other key applications.
  • Minimize autostarting services to reduce attack surface.
  • Allow Qubes developers to implement security best practices without conflicting with upstream policies.

Other alternatives:

  • C) Reject use of a security-focused Linux distribution by default (due to lack of resources) and improve Qubes branding to reflect that this is out-of-scope. (non-ideal)
  • D) Abolish "respect distribution culture" policy. (non-ideal)

The value to a user, and who that user might be

  • Aligns the out-of-the-box Qubes experience with user expectations of a security-focused OS.
  • Provides better default protection for users who don't customize their templates.

Completion criteria checklist

Metadata

Metadata

Assignees

No one assigned

    Labels

    C: templatesThis issue pertains to templates in general (as opposed to specific templates).P: defaultPriority: default. Default priority for new issues, to be replaced given sufficient information.securityThis issue pertains to the security of Qubes OS.

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions