>>48311
>He's talking about running full OpenBSD in a VM as your main working environment.
No one does this. No one runs a VM just to run a single VM. A VM is a way to colocate processes and isolate them (or run multiple OS's).
>I.e. intruder does not have to attack kernel+hypervisor, he can attack kernel OR hypervisor.
Attacking hypervisior without root sounds hard since only the kernel interacts with hardware. Can't even open raw sockets.
>it's approach to security is not code correctness (which devs concisder to be impossible) but compartmentalization.
Code correctness on linux monstrosity is probably impossible. Never audited either. Isolation is probably good idea.
>It only needs to make sure it's hypervisor is extra-protected, and when VMs get attacked, it only affects one or two programs at a time.
Point of isolating processes into VM's.
>But you'll probably get better compartmentalization by actually running your programs on different machines, though. RaspberryPi Qubes cluster when?
Preferred, but you can't carry around a PI cluster.
I think qubes is a good approach to security for Linux. I think in theory the attack surface has definitely increased when using a hypervisor, but a user level program attacking a hyper-visor sounds hard. Perhaps side channel information leaks are possible (everyone's fear), but has this ever been observed ?