Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Qubes OS

From Wikipedia, the free encyclopedia
Security-focused Linux-based operating system
"Qubes" redirects here. For the arcade game, seeQ*bert's Qubes. For other uses, seeQube (disambiguation).
Not to be confused withQ4OS.

Linux distribution
Qubes OS
Qubes OS 4.1.2 with its defaultXfceDE runningFedora 37,Debian 11 andWhonix 16 virtualizations.
DeveloperThe Qubes OS Project

Invisible Things Labs

Joanna Rutkowska
OS familyLinux (Unix-like)
Working stateCurrent
Source modelOpen source with proprietary blobs,[1][2]
Initial releaseSeptember 3, 2012; 13 years ago (2012-09-03)[3]
Latest release4.3.0[4] Edit this on Wikidata / 21 December 2025; 57 days ago (21 December 2025)
Marketing targetsecurity bycompartmentalization, desktop, laptop
Available inMultilingual
Update methodDNF (PackageKit)
Package managerRPM Package Manager
Supported platformsx86-64
Kernel typeMicrokernel (Xen Hypervisor running minimalLinux-based OSes and others)
UserlandGNU[a]
Default
user interface
Xfce
LicenseFree software licenses
(mainlyGPL v2[7])
Official websitequbes-os.org
TaglineA Reasonably Secure Operating System

Qubes OS is asecurity-focused desktop operating system that aims to providesecurity throughcompartmentalization.[8] Compartmentalization is provided through the use ofvirtualization technology. This allows the segmentation of applications into securevirtual machines called qubes. Virtualization services in Qubes OS are provided by theXen hypervisor.

The runtimes of individual qubes are generally based on a unique system of underlying operating systemtemplates. Templates provide a single, immutable root file system which can be shared by multiple qubes. This approach has two major benefits. First, updates to a given template are automatically "inherited" by all qubes based on it. Second, shared templates can dramatically reduce storage requirements compared to separate VMs with a full operating install per secure domain.

The base installation of Qubes OS provides a number of officially supported templates based on theFedora andDebian Linux distributions. Alternative community-supported templates includeWhonix,Ubuntu,Arch Linux,CentOS, orGentoo.[9] Users may also create their own templates.

Operating Systems like Qubes OS are referred to in academia asConverged Multi-Level Secure (MLS) Systems.[10] Other proposals of similar systems have surfaced[11][12] andSecureView andVMware vSphere are commercial competitors.[citation needed]

Security goals

[edit]
Security domains scheme

Qubes implements aSecurity by Isolation approach.[13] The assumption is that there can be no perfect, bug-free desktop environment: such an environment counts millions oflines of code and billions ofsoftware/hardware interactions. One critical bug in any of these interactions may be enough formalicious software to take control of a machine.[14][15]

To secure a desktop using Qubes OS, the user takes care to isolate variousenvironments, so that if one of the components gets compromised, the malicious software would get access to only the data inside that environment.[16]

In Qubes OS, the isolation is provided in two dimensions: hardware controllers can be isolated intofunctional domains (e.g.network domains, USB controller domains), whereas the user's digital life is divided intosecurity domains with different levels of trust.

For instance: work domain (most trusted), shopping domain, random domain (less trusted).[17] Each of these domains is run in a separate qube.

The qubes have passwordless root access (e.g. passwordlesssudo) by default.[18]UEFI Secure Boot is not supported out of the box; the Qubes OS team does not consider this a major security issue.[19] Qubes is not amultiuser system.[20]

Installation and System Requirements

[edit]

As a desktop-focused operating system, Qubes OS targets personal computer hardware. This market is dominated by laptops running Intel and AMD processors and chipsets.

Theminimum base system requirements[21] for Qubes OS are:

  • 64-bit Intel or AMD processor with virtualization extensions[b]
  • 6 GB of RAM
  • 32 GB of disk space

User experience

[edit]

Users interact with Qubes OS in much the same manner that they interact with any standard graphical desktop operating systems with some key differences:

  • The creation of qubes (security domains) offers the means to create discrete, lean, secure application spaces by linking them to a complete root filesystem using shared templates.
  • Applications launched from their respective qubes are distinguished by a unique colored window border.
  • Opening an application for the first time in a given qube may incur a modest delay depending on system hardware.
  • Sharing files[23] and clipboard paste buffers[24] utilize a special mechanism, as qubes do not share a common clipboard orfile system.
  • Users can create and manage as many qubes as desired to suit their specific requirements.

System architecture overview

[edit]
icon
This sectionneeds additional citations forverification. Please helpimprove this article byadding citations to reliable sources in this section. Unsourced material may be challenged and removed.(December 2023) (Learn how and when to remove this message)

Xen hypervisor and domains

[edit]

The Xen hypervisor provides strong isolation between its hosted virtual machines, calleddomains in Xen terminology.

The first domain started by Xen is the privilegedadministrative domain referred to asdomain zero or more commonlydom0.

The Administrative domain: dom0

[edit]

As of Qubes OS 4.1.2, the operating system running in dom0 isFedora Linux running a paravirtualized Linux kernel. It is the Linux kernel in dom0 that controls and brokers access to all the physical system hardware, via standard Linux kernel device drivers.

The operating system hosts the user's graphical desktop and controls most hardware devices. This includes the graphics device, USB ports, storage and input devices, such as the keyboard and mouse. The base graphical desktop is composed of theX server, theXfwmwindow manager and theXfcedesktop.

By design, dom0 has the least possible direct interaction with the qubes in order to minimize the possibility of an attack originating from there.[25][26]

Updates to the dom0 operating system and the included Template OS images are performed via a special mechanism which does not require dom0 operating system to connect directly to a network.

The User domains: qubes

[edit]

An app qube (an instance of a qube) provides secure, compartmentalized execution of standard user applications such as aweb browser, anemail client or atext editor.

Operation of app qubes is controlled by theQube Manager. It launches the discrete app qubes and presents their applications on the desktop of dom0 as normal process windows.

This mechanism follows the idea of asandbox. After running the application, viewing the document, etc., the whole disposable will be destroyed on shutdown.[27]

Qubes OS integrates all of the app qubes into a single commondesktop environment. The identity of each app qube for a given process is provided by an unforgeable, colored window border which is defined in the properties of the app qube.

Disk usage in dom0 is minimized by allowing multiple app qubes to share a common "template" root file system image maintained in read-only mode. Additional disk storage is only used for userʼs applications, data and per-VM settings.

Network domain

[edit]

The network mechanism is the most exposed to security attacks. To circumvent this, it is isolated in a separate, unprivileged qube, named thenet qube.

Anotherfirewall Domain is used to house the Linux-kernel-based firewall, so that even if the network domain is compromised, the firewall is still isolated and protected (as it is running in a separate Linux kernel in a separate VM).[28]

Reception

[edit]

Security and privacy experts such asEdward Snowden,Daniel J. Bernstein, andChristopher Soghoian have publicly praised the project.[29]

Jesse Smith wrote a review of Qubes OS 3.1 forDistroWatch Weekly:[30]

I had a revelation though on the second day of my trial when I realized I had been using Qubes incorrectly. I had been treating Qubes as a security enhanced Linux distribution, as though it were a regular desktop operating system with some added security. This quickly frustrated me as it was difficult to share files between domains, take screen shots or even access the Internet from programs I had opened in Domain Zero. My experience was greatly improved when I started thinking of Qubes as being multiple, separate computers which all just happened to share a display screen. Once I began to look at each domain as its own island, cut off from all the others, Qubes made a lot more sense. Qubes brings domains together on one desktop in much the same way virtualization lets us run multiple operating systems on the same server.

Kyle Rankin fromLinux Journal reviewed Qubes OS in 2016:[31]

I'm sure you already can see a number of areas where Qubes provides greater security than you would find in a regular Linux desktop.

In 2014, Qubes was selected as a finalist of Access Innovation Prize 2014 for Endpoint Security, run by the international human rights organizationAccess Now.[32]

See also

[edit]

Notes

[edit]
  1. ^The base (dom0) operating system in Qubes OS 4.2 isFedora 37,[5] which uses theGNU coreutils.[6]
  2. ^Since 2013, Qubes OS only supports 64-bit processors.[19] In addition, since release 4.x, Qubes OS requires either anIntel processor with support forVT-x with EPT andIntel VT-d or anAMD processor with support forAMD-V with RVI (SLAT) andAMD-Vi (aka AMD IOMMU).[22] This is not a major issue for AMD processors since AMD IOMMU is functionally identical to Intel's VT-d.[22]



References
  1. ^"Will Qubes seek to get certified under the GNU Free System Distribution Guidelines (GNU FSDG)?".
  2. ^"Qubes OS License".
  3. ^"Introducing Qubes 1.0!". September 3, 2012.
  4. ^"Qubes OS 4.3.0 has been released!". December 21, 2025. RetrievedDecember 22, 2025.
  5. ^"Supported releases § Dom0".Archived from the original on February 24, 2025.
  6. ^"Fedora CoreOS Release Notes § 37.20230401.3.0".
  7. ^"License Qubes OS".www.qubes-os.org.
  8. ^"Qubes OS bakes in virty system-level security".The Register. September 5, 2012.
  9. ^"Qubes OS Templates".
  10. ^Issa, Abdullah; Murray, Toby; Ernst, Gidon (December 4, 2018)."In search of perfect users: towards understanding the usability of converged multi-level secure user interfaces".Proceedings of the 30th Australian Conference on Computer-Human Interaction. OzCHI '18: 30th Australian Computer-Human Interaction Conference. Melbourne Australia:Association for Computing Machinery (ACM). p. 572576.doi:10.1145/3292147.3292231.ISBN 978-1-4503-6188-0. RetrievedNovember 1, 2020.
  11. ^Beaumont, Mark; McCarthy, Jim; Murray, Toby (December 5, 2016)."The cross domain desktop compositor: using hardware-based video compositing for a multi-level secure user interface".Proceedings of the 32nd Annual Conference on Computer Security Applications. ACSAC '16: 2016 Annual Computer Security Applications Conference. Los Angeles California USA:Association for Computing Machinery (ACM). p. 533545.doi:10.1145/2991079.2991087.ISBN 978-1-4503-4771-6. RetrievedNovember 1, 2020.
  12. ^Filyanov, Atanas; Nas, Aysegül; Volkamer, Melanie (July 1, 2013)."Poster: On the Usability of Secure GUIs"(PDF). p. 11.S2CID 17605611.
  13. ^"The three approaches to computer security". Joanna Rutkowska. September 2, 2008.
  14. ^"Qubes OS: An Operating System Designed For Security". Tom's hardware. August 30, 2011.
  15. ^"A digital fortress?".The Economist. March 28, 2014.
  16. ^"How Splitting a Computer Into Multiple Realities Can Protect You From Hackers". Wired. November 20, 2014.
  17. ^"Partitioning my digital life into security domains". Joanna Rutkowska. March 13, 2011.
  18. ^Passwordless Root Access in VMs
  19. ^ab"Qubes FAQ". RetrievedAugust 5, 2025.
  20. ^Rutkowska, Joanna (May 3, 2010)."Google Groups - Qubes as a multi-user system".Google Groups.
  21. ^"Qubes system requirements".Archived from the original on January 30, 2025.
  22. ^abWhy Intel VT-d ?
  23. ^"Copying Files between qubes".Qubes OS. RetrievedJune 5, 2020.
  24. ^"Copy and Paste".Qubes OS. RetrievedJune 5, 2020.
  25. ^"(Un)Trusting your GUI Subsystem". Joanna Rutkowska. September 9, 2010.
  26. ^"The Linux Security Circus: On GUI isolation". Joanna Rutkowska. April 23, 2011.
  27. ^"Qubes To Implement Disposable Virtual Machines". OSnews. June 3, 2010.
  28. ^"Playing with Qubes Networking for Fun and Profit". Joanna Rutkowska. September 28, 2011.
  29. ^"Endpoint Security Prize Finalists Announced!".
  30. ^DistroWatch Weekly, Issue 656, 11 April 2016
  31. ^Secure Desktops with Qubes: Introduction |Linux Journal
  32. ^"Endpoint Security Prize Finalists Announced!". Michael Carbone. February 13, 2014.

External links

[edit]
Wikimedia Commons has media related toQubes OS.
Fedora Linux derivatives
Active
Defunct
Android
LineageOS
Arch
Debian
Ubuntu
Fedora
CentOS
Stream
Gentoo
Mandrake
Mandriva
Slackware
SUSE
Other
Discontinued
Android
Arch
Debian
Gentoo
Red Hat,
Fedora
Slackware
SUSE
Other
Hardware
(hypervisors)
Native
Hosted
Specialized
Independent
Tools
Operating
system
OS containers
Application containers
Virtual kernel architectures
Related kernel features
Orchestration
Desktop
Application
Network
See also
General
Software
packages
Community
Organisations
Licenses
Types and
standards
Challenges
Related
topics
Retrieved from "https://en.wikipedia.org/w/index.php?title=Qubes_OS&oldid=1331906785"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2026 Movatter.jp