Re: Want to make a virtualbox installation more secure
Posted: 29. Apr 2013, 02:18
I am kind of surprised that everyone commenting so far has missed the point so I will try to explain exactly why what I want to achieve DOES work.
1) The objective is to allow remote access to Corporate Network from an employee's computer which may or may not be secure.
2) I or corporate do not care what happens to the employees computer, if it is compromised, that is the employee's problem and should not be ours.
3) right now access to the corporate network is through Corporate owned laptops only. Access is acheived via a secure VPN client (Cisco VPN client) that is preconfigured. Also access security is multi-tiered requiring RSA Token and User Password.
4) I have proposed a secure VM for access. The secure VM guest is secure because
(a) same security restrictions as exist on physical machine (domain membership required, secur VPN client, RSA Token and remote password, etc.)
(b) no network access for VM to guest (NAT'ed network interface, Host cannot ping, or use ARP to discover VM)
(c) no VM USB access to Host
(d) no VM CD/DVD Rom access to Host
(e) no VM to Host Shared Folders
(f) no Virtual Box manager. VM is started by VBoxSDL
(5) Scenarios where Host is compromised:
(a) rogue employee-- Because the rougue employee already has remote access privileges security of Corporate Domain are in effect: remove employees rights, terminate employee, burn the remote VM by removing it from remote access group. In the scenario of employee having a physical Corporate owned machine, we may lose the machine but with a VM, we just burn it.
(b) employees game playing teenage son visits malware sites and infects Host machine:
(i) teenage son couldn't invoke VM with out access password and could not access corporate network without RSA Token and remote password
(ii) infected HOST would not invoke VM unless specifically designed to log key strokes and would still fail for inability to produce correct RSA Token.
(iii) mechanisms for transferring data from HOST to VM are removed
(iv) mechanisms for transferring data from VM to HOST are removed
(v) malware not able to proprogate from Host to VM (See comments on general malware below)
(C) Host computer unable to connect to internet, or malfuntctions in some way (corrupted registry, redirected host programs, etc)-- VM is unaffected and most likely unaccessible as the HOST is unusable. Corporate can burn the VM when notified by employee.
I have learned a few things about Virus and Malware in 20 years: the mechanisms for propogation and compromise are generally quite primitive (new Registry keys, altered registry keys, added start up options, browser redirection, key logging, spam propagation, email compromise) In order for a malware to penetrate a Virtual Machine would take very specific and targeted programming that would run into the tens of thousands of line of code. It is just not feasible. If someone wanted to target our network for compromise, an out in the wild virus or malware is not going to be the method.
There seems to be the assumption that because the HOST is insecure the VM is insecure. As mpack pointed out, the Guest OS and the Host OS are two different machines. When NAT'ed, they are also two different networks. The infection or compromise of the HOST does not mean that the VM is likewise compromised. In my tests, I have been able to demonstrate that the VM remains secure when the HOST is compromised. (intentionally infected a host with a trojan, then invoked the VM to see if its browser was redirected as was the HOST. The VM was uninfected).
For my specific purpose I am satisfied that a secure VM can be used to access the corporate network. For a generalized purpose, I can see where VM's offer another level of security for everyday use.
Thank you,
nipperdj
1) The objective is to allow remote access to Corporate Network from an employee's computer which may or may not be secure.
2) I or corporate do not care what happens to the employees computer, if it is compromised, that is the employee's problem and should not be ours.
3) right now access to the corporate network is through Corporate owned laptops only. Access is acheived via a secure VPN client (Cisco VPN client) that is preconfigured. Also access security is multi-tiered requiring RSA Token and User Password.
4) I have proposed a secure VM for access. The secure VM guest is secure because
(a) same security restrictions as exist on physical machine (domain membership required, secur VPN client, RSA Token and remote password, etc.)
(b) no network access for VM to guest (NAT'ed network interface, Host cannot ping, or use ARP to discover VM)
(c) no VM USB access to Host
(d) no VM CD/DVD Rom access to Host
(e) no VM to Host Shared Folders
(f) no Virtual Box manager. VM is started by VBoxSDL
(5) Scenarios where Host is compromised:
(a) rogue employee-- Because the rougue employee already has remote access privileges security of Corporate Domain are in effect: remove employees rights, terminate employee, burn the remote VM by removing it from remote access group. In the scenario of employee having a physical Corporate owned machine, we may lose the machine but with a VM, we just burn it.
(b) employees game playing teenage son visits malware sites and infects Host machine:
(i) teenage son couldn't invoke VM with out access password and could not access corporate network without RSA Token and remote password
(ii) infected HOST would not invoke VM unless specifically designed to log key strokes and would still fail for inability to produce correct RSA Token.
(iii) mechanisms for transferring data from HOST to VM are removed
(iv) mechanisms for transferring data from VM to HOST are removed
(v) malware not able to proprogate from Host to VM (See comments on general malware below)
(C) Host computer unable to connect to internet, or malfuntctions in some way (corrupted registry, redirected host programs, etc)-- VM is unaffected and most likely unaccessible as the HOST is unusable. Corporate can burn the VM when notified by employee.
I have learned a few things about Virus and Malware in 20 years: the mechanisms for propogation and compromise are generally quite primitive (new Registry keys, altered registry keys, added start up options, browser redirection, key logging, spam propagation, email compromise) In order for a malware to penetrate a Virtual Machine would take very specific and targeted programming that would run into the tens of thousands of line of code. It is just not feasible. If someone wanted to target our network for compromise, an out in the wild virus or malware is not going to be the method.
There seems to be the assumption that because the HOST is insecure the VM is insecure. As mpack pointed out, the Guest OS and the Host OS are two different machines. When NAT'ed, they are also two different networks. The infection or compromise of the HOST does not mean that the VM is likewise compromised. In my tests, I have been able to demonstrate that the VM remains secure when the HOST is compromised. (intentionally infected a host with a trojan, then invoked the VM to see if its browser was redirected as was the HOST. The VM was uninfected).
For my specific purpose I am satisfied that a secure VM can be used to access the corporate network. For a generalized purpose, I can see where VM's offer another level of security for everyday use.
Thank you,
nipperdj