Jump to content

Subgraph (operating system)

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by Jvoisin (talk | contribs) at 15:20, 3 August 2023 (Features: Subgraph never provided any resistance against cold boot attacks.). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Subgraph OS
OS familyLinux (Unix-like)
Working stateDiscontinued[1]
Source modelOpen source
Final preview2017.09.22[2] / 22 September 2017; 7 years ago (2017-09-22)
Repositorygithub.com/orgs/subgraph/repositories
Kernel typeMonolithic (Linux)
UserlandGNU
Influenced byTails, Qubes OS
Default
user interface
GNOME 3
LicenseGPLv3+
Official websitesubgraph.com

Subgraph OS was a Debian-based project designed to be resistant to surveillance and interference by sophisticated adversaries over the Internet.[3][4][5][6][7][8] It has been mentioned by Edward Snowden as showing future potential.[9]

Subgraph OS was designed to be locked down, with a reduced attack surface, to increase the difficulty to carry out certain classes of attack against it. This was accomplished through system hardening and a proactive, ongoing focus on security and attack resistance. Subgraph OS also placed emphasis on ensuring the integrity of installed software packages through deterministic compilation.

The last update of the project's blog was in September 2017[10], and all of its github repositories haven't seen any recent activity as of 2021.[11]

Features

Some of Subgraph OS's notable features included:

  • Linux kernel hardened with the grsecurity and PaX patchset.[12]
  • Linux namespaces and xpra for application containment.
  • Mandatory file system encryption during installation using LUKS.
  • Configurable firewall rules to automatically ensure that network connections for installed applications are made using the Tor anonymity network. Default settings ensure that each application's communication is transmitted via an independent circuit on the network.
  • GNOME Shell integration for the OZ virtualization client, which runs apps inside a secure Linux container, targeting ease-of-use by everyday users.[13]

Security

The security of Subgraph OS (which uses sandbox containers) has been questioned in comparison to Qubes (which uses virtualization), another security focused operating system. An attacker can trick a Subgraph user to run a malicious unsandboxed script via the OS's default Nautilus file manager or in the terminal. It is also possible to run malicious code containing .desktop files (which are used to launch applications). Malware can also bypass Subgraph OS's application firewall. Also, by design, Subgraph does not isolate the network stack like Qubes OS.[14]

See also

References

  1. ^ https://distrowatch.com/table.php?distribution=Subgraph
  2. ^ "Subgraph OS September 2017 ISO Availability". subgraph.com. Retrieved 22 September 2017.
  3. ^ Subgraph: This Security-Focused Distro Is Malware's Worst Nightmare | Linux.com | The source of Linux information
  4. ^ DistroWatch Weekly, Issue 697, 30 January 2017
  5. ^ The best Linux distro for privacy and security in 2018 | TechRadar
  6. ^ Subgraph announces security conscious OS | WIRED UK
  7. ^ Best Linux Distributions For Privacy Freaks | It's FOSS
  8. ^ Subgraph OS, a new security-centric desktop distribution [LWN.net]
  9. ^ Styles, Kirsty (16 March 2016). "Subgraph will be Snowden's OS of choice – but it's not quite ready for humans yet". The Next Web. Retrieved 7 July 2016.
  10. ^ "Subgraph - Blog". subgraph.com. Retrieved 2023-08-03.
  11. ^ "Subgraph". GitHub. Retrieved 2023-08-03.
  12. ^ "Hardening". subgraph.com. Retrieved 2023-08-03.
  13. ^ "GitHub - OZ: a sandboxing system targeting everyday workstation applications". Subgraph. Retrieved 6 October 2016.
  14. ^ "Breaking the Security Model of Subgraph OS | Micah Lee's Blog". micahflee.com. Retrieved 2017-04-25.