Qubes-VM-hardening icon indicating copy to clipboard operation
Qubes-VM-hardening copied to clipboard

Fend off malware at Qubes VM startup

Results 19 Qubes-VM-hardening issues
Sort by recently updated
recently updated
newest added

Candidate whitelist items are commonly-used files such as: * Network Manager connections * VPN configurations etc. Maybe included as inactive examples.

enhancement
question

When `sys-whonix` is started for the first time `Anon-Conection-Wizard` is supposed to automaicaly start, and walk users through Tor setup and configuration. However, unlike in previous Whonix versions {13,14} when...

Currently `vm-boot-protect` is the most compatible mode for Whonix VMs (but see issue #31). It might be desirable to explore using the more extensive `vm-boot-protect-root` mode for whonix-ws VMs by...

Using whonix-gw-15: The vm-boot-protect service is failing to run properly for sys-whonix. It looks like its not able to re-mount private volume as read-write: ``` user@host:~$ sudo journalctl -u vm-boot-protect...

The way that Qubes initializes /rw when a VM is first started presents a problem to vm-boot-protect. It appears that the Linux GUI bits (which run later) become jammed if...

bug
help wanted

Needs a way to set loglevel so admin can prevent details from showing after a normal VM startup.

enhancement
help wanted

Logic to detect VM type such as netVM, proxyVM, appVM and handle some things differently such as Network Manager settings, etc. User can already target policy for replacing and whitelisting...

enhancement

Current sequence goes like: 1. Checksums 2. Quarantine /rw dirs a. Whitelist 3. Deploy files 4. Set immutable /home files An administrator may find a different sequence useful, for example...

enhancement