
Qubes OS opts for a minimal host, which provides only the GUI: optionally, KDE or Xfce. Virtualization tools such as Parallels, VirtualBox, or VMware are capable of providing a similar level of isolation however, a VM solution is only as secure as the host operating system. You might argue that this kind of security measure does not necessitate creating a new operating system distribution. This encapsulation goes further than in a chroot environment, in which the systems share hardware resources such as network cards. These groups run on separate Xen VMs, which isolates the apps far more effectively than a normal operating system would. Instead of running all applications side by side, Qubes OS sets appropriate security levels for application groups. Technically, it might be possible to prevent access to the other user’s sphere of activity after entering by su -, but this would only be a stopgap, because no application should receive data from any other. Local input for the remote system can be recorded. On the brighter side, this sniffing attack does not work for X11 forwarding via SSH – so attackers at least cannot sniff the commands entered by a person working on a remote computer. I then followed with Enter and the root for Kali VM – if you check this yourself, you will realize that X11 is quite insecure. In the example, I initially entered su -, which produced the first eight scancodes. Where 8 stands for the keyboard I am using.įigure 2: The xinput test 8 command records keyboard scan codes – in this case, su - followed by the root password. I followed this suggestion in our lab, as you can see in Figure 1, entering xinput test 8 After entering xinput with no parameters, you see a list of the available input devices. As a simple demonstration, she proposed a small test with the standard xinput tool and two terminal windows. One of Rutkowska’s main criticisms of existing security solutions is the lack of security in X11: Because of the biblical age of the X window system, applications are not sufficiently isolated from one other. The current version of Qubes is the Beta 2 from February 2013 a third beta release is still under construction and was actually due for release three months ago. Rutkowska is currently working on Qubes OS, which is available under GPLv2 a final Version 2.0 Release 2 (or R2) will probably appear in early or mid 2014. Rutkowska is best known for her work on Blue Pill, which is a rootkit that attacks the guest system from within the hypervisor. She also considers artificial enhancements, such as SELinux, ineffective. All of the retrofitted security features, such as address space layout randomization, are reactive, meaning that they do not resolve the underlying programming error.Įven the highly successful approaches that have been taken by OpenBSD still do not go far enough, according to Polish security researcher Joanna Rutkowska. As a basic rule, prevention is better than a cure. In addition to these measures, OpenBSD incorporates a number of additional obstacles, which greatly complicate attacks if a security-related bug should happen to crop up.Įven Microsoft has copied this part of the strategy for Windows.
Qubes os virtualbox code#
According to most experts, checking the code is essential for any secure system, because the majority of all serious security issues are attributable to well-known programming errors.īreak-ins occur because of buffer overflows, format string vulnerabilities, off-by-one errors, and sometimes also because of incorrectly initialized random number generators. OpenBSD also does everything right in terms of its design: It guarantees security through high-quality management, including code reviews, coding standards, and automated tests. Does the world really need another operating system that claims to be totally secure? It already has OpenBSD, which has reported two remote vulnerabilities in the past 16 years – others can only dream of that kind of security.
