-
-
Notifications
You must be signed in to change notification settings - Fork 53
Description
The problem you're addressing (if any)
Qubes OS is marketed as "a reasonably secure operating system", leading users to expect comprehensive security hardening across all aspects of the system. This includes a hardened default browser and other Template hardening. However, the current default templates, particularly for default App Qubes, often include software with suboptimal security (and privacy) settings. This creates a disconnect between user expectations and the out-of-the-box experience.
Here are some examples. Quote Is there a reason Firefox needs to have vulnerable insecure settings in the templates? and Is Firefox really an appropriate default browser for Qubes?:
-
Firefox comes configured with worst privacy settings
-
When I first installed Qubes and I saw Firefox was preloaded I did assume it would have default security setting to be more secure out of the box due to the nature of the system. It was kind of shock to me that it was just setup like a straight download off Firefox.
-
why the hell is Firefox allowed to be the default browser on a privacy/security OS when every time I launch it it wants to call all of its friends back home? Literally all of them, even its grandma.
It is currently not possible to address this issue in Debian, Fedora Templates, because of the related Qubes FAQ: What is Qubes’ attitude toward changing guest distros?. The policy of respecting distribution policy is in direct conflict with Qubes making changes for customization (selected default installed packages), usability (Qubes tools integrations) and security hardening.
Example Qubes tickets which can currently not be implemented because of this policy.
- Debian template: disable newly (all) installed services by default #2238
- Package security-misc from Whonix to Qubes #1885
This was confirmed by @marmarek in #8730 (comment).
As you can see, in both cases we in fact did not include them, and in the first case it's even explicitly discussed if that wouldn't be against what Debian is.
Fork in this context only means to have for example a Template based on Qubes Debian template, with a distinct name, where security-hardening by default would be permissible without being in contradicting with respecting upstream Linux distribution policy. No other gigantic steps (such as forking all of Debian archive packages.debian.org, re-building all the Debian archive are suggested.
The solution you'd like
- A) Adopting an existing security-focused Linux distribution as the base if any suitable exists; or
- B) A fork of a base distribution by Qubes for the purpose of security-hardening it by default and use it by default.
This new template would:
- Have security-optimized default settings for browsers and other key applications.
- Minimize autostarting services to reduce attack surface.
- Allow Qubes developers to implement security best practices without conflicting with upstream policies.
Other alternatives:
- C) Reject use of a security-focused Linux distribution by default (due to lack of resources) and improve Qubes branding to reflect that this is out-of-scope. (non-ideal)
- D) Abolish "respect distribution culture" policy. (non-ideal)
The value to a user, and who that user might be
- Aligns the out-of-the-box Qubes experience with user expectations of a security-focused OS.
- Provides better default protection for users who don't customize their templates.