On 2015-02-17 11:28 am, Joanna Rutkowska wrote:
> On 02/17/15 11:55, WhonixQubes wrote:
>> Hi Joanna,
>>>>>> On 2015-02-16 9:38 am, Joanna Rutkowska wrote:
>>>>>> Xen has support for emulating CPUID for HVM guests -- take a look at
>>> the
>>> config examples in:
>>>>>> xen-4.1.6.1/tools/examples/xmexample.hvm-stubdom
>>>>>> I looked through the CPUID feature in this example file:
>>>> -
>> http://xenbits.xen.org/gitweb/?p=xen.git;a=blob_plain;f=tools/examples/xmexample.hvm-stubdom;hb=stable-4.1
>>>>>> More general info on CPUID for others:
>> - https://en.wikipedia.org/wiki/CPUID
>>>> Some of the very low-level x86 implementation details of it are beyond
>> me currently, but, from what I can glean it looks like it is generally
>> the right type of thing, since it seems to be baked into the Xen Dom0
>> layer beyond the reach of the HVM's OS.
>>>> The CPUID interception is implemented in the hypervisor via VT-x. Dom0
> has nothing to do with that...
>
Err, oops, duh, I know better. I often conflate the terminology of Xen
Hypervisor and Xen Dom0. Yes, rather, I meant Xen Hypervisor. :)
>> Would be looking for AnonVMs to simply not be able to know what CPU
>> the
>> host machine is running on, by any means (barring covert channels or
>> Xen
>> breakouts), but even including privilege-escalated malware in the VM.
>>>>>>>>> I haven't played with it, but see no reasons it should not work. I
>>> can
>>> imagine we introduce a prefs for VMs (say "generic_cpuid" settable
>>> via
>>> qvm-prefs) that would be resulting in additional config for cpuid
>>> emulation inserted in the config file for such VMs.
>>>>>> Sounds good.
>>>>>>>>> We would need to
>>> agree on good-enough-for-everybody CPUID config and stick to it then.
>>> Again, this would be use-able for anon VMs mostly.
>>>>>> Yes. Sounds like a plan.
>>>> I'm guessing that this would *not* limit the speed of the CPU(s) that
>> the HVM is exposed to? Just changes the info/attributes of the AnonVM
>> domain's CPU (including reported MHz?)?
>>>>>> No.
>
Ok, so, *No*, it will not limit actual CPU operating speed.
But, would it also mask/fake the *reported* CPU speed info to being
something universal/generic?
>>>>> However, this will not work for PV VMs, because the CPUID instruction
>>> is
>>> not a privileged instruction, so malware in a PV VM can always
>>> execute
>>> this instruction (even if we hooked Xen interface for CPUID-like info
>>> to
>>> the guest) without trapping into XEN in PV operation.
>>>>>> That's too bad for excluding paravirtualized VMs.
>>>> BTW, it should be obvious, but let me point out that any
> compartmentalizing technology for x86 that is *not* based on VT-x/AMD-v
> would be prone to this problem. This is b/c CPUID is an *instruction*
> and its execution cannot otherwise be controlled by the OS, other than
> via VT-x intercept.
>>> However, if there is no way to achieve a masked CPU with PVMs, then so
>> be it.
>>>> Given the general statistical environment of AnonVM users, I think
>> unique CPU info is too important of a de-anonymization vector to hold
>> onto PVMs for.
>>>>>>>>> AFAIU, there are not personal identifying info returned by CPUID, but
>>> I
>>> can see how this could be used as an additional fingerprinting
>>> vector.
>>>>>> Right.
>>>> For example, subdividing the cross-section of privacy/anonymity users
>> by
>> the following attributes would no doubt be a privacy/anonymity killer
>> for individual human identities...
>>>> # of unique combined mixtures of the following attributes:
>> - # of Qubes Users
>> - # of Qubes + Tor AnonVM Users
>> - # of Qubes + Whonix AnonVM Users
>> - # of CPU Model Info
>> - # of CPU Microcode Version
>>>> FWIW, CPU ucode, AFAIK, is not CPU-persistence -- it is applied on each
> boot.
>>> ...should be pretty easy to reveal individual people through their
>> usage
>> of Qubes privacy/anonymity this way.
>>>> Although, AFAIK, other platforms are not totally immune from this.
>> Some
>> just have a higher # of total users out in the world, but at their
>> technical expense of lacking strong security isolation to protect the
>> integrity of their privacy/anonymity systems.
>>>>>> Other platforms simply do not offer any meaningful separation between
> the apps that primary targeted apps (e.g. a Web browser used for anon
> browsing) and the hw specific personal identifying info (NIC MACs, IP,
> avilable WiFi networks in the neighborhood, etc). In these case if the
> attacker (e.g. NSA) exploits your anon Web browser they already get
> you.
> In case of Qubes they can start gather info such as CPUID output and
> mining through a database of Qubes users. Quite a different level of
> threat IMHO.
>
The former is a huge reason why I use Whonix in VMs, because of this
fundamental architectural problem with systems like Tails, etc, which
have access to bare metal and don't isolate the Tor proxy from apps.
With the latter scenario in Qubes, it does take an added step of linking
2 data points together, in order to identify multiple AnonVMs as being
owned by the same pseudonymous or real world user.
A big part of the problem here is that so few people are using Qubes +
Whonix, that if 2 AnonVMs got trivially popped (via Firefox,
Thunderbird, PDF, IMG, etc) and had the same CPU specs, it would no
doubt predictably be the same user/person out in the world using that
instance of Qubes + Whonix, since there are probably many more CPU
models than such users at this point.
And if there is any personally identifying info/documents/etc inside one
of the VMs, then it's a true identity game over for all known AnonVM
activity simply tied back to a CPU model.
With GOV netflow and other vast personal activity history, such as
technology purchases, software statistics/debug uploads, Qubes HCL
report contributions, etc, it only gets easier to filter out key
information and potentially infer identity based on 1 single AnonVM
compromise.
By making the AnonVM OS technical environment entirely
universal/generic, people could have multiple pseudonymous and/or
personally identifiable info inside AnonVMs, and still have some
meaningful confidence that they couldn't be linked by 1 or 2 intrusions
of some simple malware.
I personally wouldn't be one bit surprised if such a de-anonymization
has already happened for a Qubes AnonVM user based on these
same-or-similar technical fingerprinting methods.
>>>>> Thus, perhaps we should consider distributing Whonix workstation
>>> template as an HVM template instead of a PVM one? Fortunately we do
>>> have
>>> templates support for HVMs, so this should be perfectly possible.
>>>>>> Assuming there is no feasible way to accomplish this objective with
>> PVMs, then implementing the Whonix-Workstation in a HVM template with
>> "generic_cpuid" sounds like the right move.
>>>> Another anonymity upshot of HVMs is their, by default, non-seamless
>> fixed single windowing.
>> You can have seamless GUI for HVM VMs.
>>> Even though the seamless desktop mode of the new Qubes + Whonix
>> platform is sexy and smooth to use, it does expose another
>> semi-unique host machine attribute to the AnonVMs, which is the
>> host's unique display resolution size and pixel depth (maybe some
>> other related stuff too?).
>> Don't quite get it? Like 1600x900 instead of 1920x1080 you mean?
>
Yes. Host machine screen pixel size and bit/color depth values.
In a Qubes VM/AnonVM one can run:
printenv
and get H=height, W=width, D=depth as the host machine's actual hardware
display.
or install something like "hardinfo" package to view in GUI
It's yet another hardware fingerprint value that is semi-unique to the
user's configuration.
VirtualBox + Whonix, for example, on purpose for a privacy/anonymity
optimized environment, has a default universal/generic screen size
setting of 1024x768.
And same 1024x768 universal/generic screen size exists with the original
Qubes + Whonix HVM port.
>> Not as bad of an attribute as the host's
>> unique CPU info, but still would be best to make use of the fixed
>> single windowing for AnonVMs so this could be generic. Maybe both
>> seamless and non-seamless windowing options could be offered for
>> Whonix-Workstation HVM template, since some people hate
>> non-seamless.
>>>>>>>>>> Let me also point out the already discussed-multiple-times topic of
>>> potential covert channels between cooperative VMs, which might also
>>> be
>>> potentially exploited in some scenarios to fingerprint user
>>> environment.
>>> That is more difficult to address on PC architecture though, but some
>>> work on Xen-level is nevertheless very welcome (see #817).
>>>>>> Yes. I have read through some of your stuff on covert channels in the
>> past, including in the original Qubes architecture spec doc.
>>>> Just read through the thread linked in Qubes ticket #817 from 2014.
>> Good
>> stuff.
>>>>>>>> WhonixQubes
>>>>>> joanna.
WhonixQubes
More information about the Whonix-devel
mailing list
“Look here!” Dick began to chuckle. “We’ve got a queer combination to work with—our Sky Patrol has! Suspicious Sandy—and—Superstitious Jeff!” Sandy grinned ruefully, a little sheepishly. Larry smiled and shook his head, warning Dick not to carry his sarcasm any further, as Jeff frowned. 52 "You do doubt me. If you did not, it would never occur to you to deny it. You doubt me now, and you will doubt me still more if you don't read it. In justice to me you must." "That same. She was part Mescalero, anyway." This Act, as disgraceful as any which ever dishonoured the statute-book in the reigns of the Tudors or Stuarts, was introduced into the Commons, on the 12th of May, by Sir William Wyndham, and was resolutely opposed by the Whigs, amongst whom Sir Peter King, Sir Joseph Jekyll, Mr. Hampden, Robert Walpole, and General Stanhope distinguished themselves. They did not convince the majority, which amounted to no less than two hundred and thirty-seven to one hundred and twenty-six. In the Lords, Bolingbroke himself moved the second reading, and it was ably opposed by the Lords Cowper, Wharton, Halifax, Townshend, Nottingham, and others. The greatest curiosity was displayed regarding the part which Oxford would take, as it was known that in the Council he had endeavoured to soften the rigorous clauses; but in the House he followed his usual shuffling habit, declaring that he had not yet considered the question; and, having induced the Opposition to let the second reading pass without a division, he absented himself from the final voting, and thus disgusted both parties and hastened his own fall. The battle of Falkirk, which in itself appeared so brilliant an affair for Prince Charles, was really one of his most serious disasters. The Highlanders, according to their regular custom when loaded with plunder, went off in great numbers to their homes with their booty. His chief officers became furious against each other in discussing their respective merits in the battle. Lord George Murray, who had himself behaved most bravely in the field, complained that Lord John Drummond had not exerted himself, or pursuit might have been made and the royal army been utterly annihilated. This spirit of discontent was greatly aggravated by the siege of the castle of Stirling. Old General Blakeney, who commanded the garrison, declared he would hold out to the last man, in spite of the terrible threats of Lord George Murray if he did not surrender. The Highlanders grew disgusted with work so contrary to their habits; and, indeed, the French engineer, the so-called Marquis de Mirabelle, was so utterly ignorant of his profession, that the batteries which he constructed were commanded by the castle, and the men were so much exposed that they were in danger of being destroyed before they took the fortress. Accordingly, on the 24th of January they struck to a man, and refused to go any more into the trenches. "Haint we bit off more'n we kin chaw. Shorty?" asked Si, as he looked over the increasing gang. "Hadn't we better ask for some help?" "How far would it carry?" Corpril, Company Q, 2 Hundsrdth Injiamiy Volintear "He d?an't care much. F?ather, he likes to be comfortable, and this Inclosure w?an't make much difference to that. 'T?un't as if we wanted the pasture badly, and F?ather he d?an't care about land." "Byles," interrupted Calverley, speaking rapidly, "you are poor—you are in arrear with your rent; a distress will be levied, and then what will become of you—of your wife and the little one? Listen to me! I will give you money to keep a house over your head; and when I am steward, you shall have the first farm at my lord's disposal, if you will only aid me in my revenge! Revenge!" he repeated, vehemently—"but you hesitate—you refuse." "Yes, yes, there is little doubt of that: but how can we come at the truth? Sudbury still retains his wrath against us, and would oppose an arrest; and even could he be waylaid, and brought hither, he is stubborn, and might refuse to answer." HoME一级做人爱c视正版免费
ENTER NUMBET 0017 www.weichila.com.cn www.sishe.net.cn pubianba.com.cn www.cuia.org.cn www.xiqula.com.cn buyan0.net.cn www.tushi4.com.cn www.banru6.net.cn supin4.net.cn yuyou0.com.cn