TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Qubes OS: A reasonably secure operating system

441 点作者 ploggingdev超过 7 年前

18 条评论

magnat超过 7 年前
Joanna&#x27;s (Qubes OS Founder) blog [1] is a gold mine when it comes to hardware-software boundary security. Especially &quot;State considered harmful&quot; [2] and &quot;x86 considered harmful&quot; [3] papers are eye-openers.<p>[1] <a href="https:&#x2F;&#x2F;blog.invisiblethings.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;blog.invisiblethings.org&#x2F;</a><p>[2] <a href="https:&#x2F;&#x2F;blog.invisiblethings.org&#x2F;papers&#x2F;2015&#x2F;state_harmful.pdf" rel="nofollow">https:&#x2F;&#x2F;blog.invisiblethings.org&#x2F;papers&#x2F;2015&#x2F;state_harmful.p...</a><p>[3] <a href="https:&#x2F;&#x2F;blog.invisiblethings.org&#x2F;papers&#x2F;2015&#x2F;x86_harmful.pdf" rel="nofollow">https:&#x2F;&#x2F;blog.invisiblethings.org&#x2F;papers&#x2F;2015&#x2F;x86_harmful.pdf</a>
评论 #15739388 未加载
评论 #15738236 未加载
评论 #15737955 未加载
评论 #15735998 未加载
AaronFriel超过 7 年前
I&#x27;m very excited that Microsoft is moving in the same direction. The feature Windows Defender Application Guard (WDAG) runs Windows applications, right now only the Edge browser, in a virtualization isolated container[1]. Under the hood it&#x27;s using what Microsoft calls &quot;Hyper-V Containers&quot;, which are lightweight virtual machines that share some host resources such as a read-only filesystem. The closest open source analogues to that are Intel(R) Clear Containers[2] and Qubes.<p>The closest you can get to Qubes on Windows would be to follow Microsoft&#x27;s Privileged Access Workstation (PAW) guide, but it requires a lot of additional infrastructure[3]. That infrastructure allows you to do remote attestation of the virtual machines, but makes it costly to deploy in a SMB or homelab environment.<p>I don&#x27;t expect it&#x27;ll be very long before PAW and WDAG are usable at the same time, with colored window borders indicating the origin virtual machine. I hope this is on Microsoft&#x27;s roadmap.<p>Video on privileged access workstation use, starting at a demo: <a href="https:&#x2F;&#x2F;youtu.be&#x2F;3v8yQz2GWZw?t=41m48s" rel="nofollow">https:&#x2F;&#x2F;youtu.be&#x2F;3v8yQz2GWZw?t=41m48s</a><p>Video on privileged access workstation setup: <a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=aPhfRTLXk_k" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=aPhfRTLXk_k</a><p>[1] <a href="https:&#x2F;&#x2F;docs.microsoft.com&#x2F;en-us&#x2F;windows&#x2F;threat-protection&#x2F;windows-defender-application-guard&#x2F;wd-app-guard-overview" rel="nofollow">https:&#x2F;&#x2F;docs.microsoft.com&#x2F;en-us&#x2F;windows&#x2F;threat-protection&#x2F;w...</a><p>[2] <a href="https:&#x2F;&#x2F;clearlinux.org&#x2F;features&#x2F;intel®-clear-containers" rel="nofollow">https:&#x2F;&#x2F;clearlinux.org&#x2F;features&#x2F;intel®-clear-containers</a><p>[3] <a href="https:&#x2F;&#x2F;docs.microsoft.com&#x2F;en-us&#x2F;windows-server&#x2F;identity&#x2F;securing-privileged-access&#x2F;privileged-access-workstations" rel="nofollow">https:&#x2F;&#x2F;docs.microsoft.com&#x2F;en-us&#x2F;windows-server&#x2F;identity&#x2F;sec...</a>
评论 #15735635 未加载
评论 #15735496 未加载
评论 #15736174 未加载
评论 #15736189 未加载
评论 #15736061 未加载
Jeaye超过 7 年前
What I&#x27;d really love to see is a marriage between NixOS and Qubes, allowing for full-system declarative configuration, including the various systems which will be running under Qubes.<p>NixOS has containers that show how this could work, but they&#x27;re only via systemd-nspawn, so not as jailed as Qube&#x27;s domUs.
评论 #15735026 未加载
评论 #15735236 未加载
评论 #15735329 未加载
xtanx超过 7 年前
I&#x27;ve been running Qubes 3.2 for about 10 months on a intel skull canyon nuc. I love it.<p>I have separate vms for media and browsing, for music (spotify), development (python, rust), skype, personal email, work email and password manager.<p>It needs 16gb of ram to be able to run all of these at once and about 150gb of disk if you actually create separate template vms.<p>My only real pain was coping and pasting between all of these vms (you need to ctrl+c then ctrl+shift+c for copy and the ctrl+shift+v, ctrl+v for paste [1])<p>I solved that with a custom solution that automatically distributes the clipboard contents (for text only) to multiple vms (depending on the source of the clipboard change). I know it defeats the purpose of isolation for the clipboard but it&#x27;s ok for my use case.<p>[1] <a href="https:&#x2F;&#x2F;www.qubes-os.org&#x2F;doc&#x2F;copy-paste&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.qubes-os.org&#x2F;doc&#x2F;copy-paste&#x2F;</a>
drawnwren超过 7 年前
I ran Qubes on a laptop for a while. 1) It&#x27;s a huge battery hog. 2) It&#x27;s a real pain to run a non rolling release distro (i.e. Arch). Some dependency is going to try and upgrade itself that can&#x27;t and it will brick your whole distro. Even being locked to a specific release proved a bit of a pain. It just adds a lot of complexity to your day to day operations (i.e. opening a program is a tiny bit more complicated) that turned out to be a huge drain for me.
评论 #15736144 未加载
snvzz超过 7 年前
Their weakest point is the hypervisor, Xen, which while a better choice than Linux&#x2F;KVM, is still extremely bloated and has a poor security history.<p>Thankfully, better designs such as seL4&#x27;s VMM do exist, although it might need a little more work [1] until usable for the purpose.<p>[1] <a href="https:&#x2F;&#x2F;sel4.systems&#x2F;Info&#x2F;Roadmap&#x2F;" rel="nofollow">https:&#x2F;&#x2F;sel4.systems&#x2F;Info&#x2F;Roadmap&#x2F;</a>
评论 #15734739 未加载
评论 #15734841 未加载
评论 #15734803 未加载
评论 #15735067 未加载
评论 #15734676 未加载
评论 #15734956 未加载
notfed超过 7 年前
Note that while Qubes OS uses full-disk encryption, it runs on Xen, which does not support hibernate.<p>This means that, if you use this OS on a laptop, you&#x27;ll be vulnerable to cold-boot attacks, even after you close your lid, unless you configure it to shutdown on lid close. (I.e., if a highly skilled adversary steals your laptop then, even if your laptop lid is closed, they will be able to read your RAM and therefore decrypt your entire hard drive.)<p>Despite the major security implications, it doesn&#x27;t sound like a fix will be implemented any time soon. [1]<p>[1] <a href="https:&#x2F;&#x2F;github.com&#x2F;QubesOS&#x2F;qubes-issues&#x2F;issues&#x2F;2414" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;QubesOS&#x2F;qubes-issues&#x2F;issues&#x2F;2414</a>
评论 #15736180 未加载
评论 #15736066 未加载
spiraldancing超过 7 年前
Whatever happened to the Qubes-Purism marriage? They were on track to start Qubes-certifying Librems, and selling Librems with Qubes pre-installed ... then they cancelled the plans, and I never heard why?
评论 #15736931 未加载
superasn超过 7 年前
Can it also protect against key-loggers, i.e. if i&#x27;m running an app in a qube, can an app in a different qube read my keystrokes?
评论 #15734723 未加载
评论 #15734806 未加载
jnwatson超过 7 年前
10 years ago, I helped design a similar system. It was a capabilities based OS on a formally modeled microkernel.<p>I&#x27;m still not sure than there&#x27;s a market for this stuff. It must be free, and it&#x27;s hard to build a business model around that.
评论 #15753305 未加载
tonetheman超过 7 年前
I wish there was a way I could try it. The hardware requirements ...<p><a href="https:&#x2F;&#x2F;www.qubes-os.org&#x2F;doc&#x2F;certified-hardware&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.qubes-os.org&#x2F;doc&#x2F;certified-hardware&#x2F;</a><p>Is anyone running this on a laptop? I get the feeling after reading that page that this is really strictly desktop only. Maybe the page has not been updated in a bit?
评论 #15735287 未加载
评论 #15735289 未加载
评论 #15737917 未加载
txgvnn超过 7 年前
How about Subgraph OS? It has grsecurity patch, tor network, container isolate, firewall. It&#x27;s another good choice also<p><a href="https:&#x2F;&#x2F;subgraph.com" rel="nofollow">https:&#x2F;&#x2F;subgraph.com</a>
bsdnoob超过 7 年前
openbsd vs qubes os, which one will you prefer?
评论 #15734798 未加载
评论 #15734906 未加载
评论 #15736889 未加载
评论 #15734805 未加载
jlgaddis超过 7 年前
Damn, I was really hoping this was an (early) announcement for 4.0 (or at least an -rc3).
评论 #15734743 未加载
partycoder超过 7 年前
QubesOS won&#x27;t protect you from Intel ME though.
评论 #15735169 未加载
评论 #15736919 未加载
评论 #15735544 未加载
mtgx超过 7 年前
Version 4.0 should be out soon (at RC2 now):<p><a href="https:&#x2F;&#x2F;www.qubes-os.org&#x2F;news&#x2F;2017&#x2F;10&#x2F;23&#x2F;qubes-40-rc2&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.qubes-os.org&#x2F;news&#x2F;2017&#x2F;10&#x2F;23&#x2F;qubes-40-rc2&#x2F;</a><p>Some exciting changes are coming:<p><a href="https:&#x2F;&#x2F;www.qubes-os.org&#x2F;news&#x2F;2017&#x2F;10&#x2F;03&#x2F;core3&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.qubes-os.org&#x2F;news&#x2F;2017&#x2F;10&#x2F;03&#x2F;core3&#x2F;</a><p><a href="https:&#x2F;&#x2F;www.qubes-os.org&#x2F;doc&#x2F;releases&#x2F;4.0&#x2F;release-notes&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.qubes-os.org&#x2F;doc&#x2F;releases&#x2F;4.0&#x2F;release-notes&#x2F;</a><p>EDIT: Downvotes for providing relevant sources, really?
评论 #15734954 未加载
评论 #15736916 未加载
known超过 7 年前
I use <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Lightweight_Portable_Security" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Lightweight_Portable_Security</a>
qrbLPHiKpiux超过 7 年前
Fun fact. The developer does not believe in using a password on her private keys.
评论 #15735272 未加载