composite
A component-based OS (by gwsystems)
qubes-mirage-firewall
A Mirage firewall VM for QubesOS (by mirage)
composite | qubes-mirage-firewall | |
---|---|---|
1 | 5 | |
181 | 201 | |
0.0% | 0.0% | |
7.1 | 7.2 | |
3 months ago | 9 days ago | |
C | OCaml | |
- | - |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
composite
Posts with mentions or reviews of composite.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-10-04.
qubes-mirage-firewall
Posts with mentions or reviews of qubes-mirage-firewall.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-11-30.
-
Is running OpenBSD inside a QUBE as a router/firewall an interesting and good idea?
2) https://github.com/mirage/qubes-mirage-firewall is by far a better firewall for Qubes than OpenBSD ever will be - unikernels are far more secure than a traditional operating system is and you can read all about it on https://mirageos.org/
-
the maddening truth of using Qubes
That's correct. It does mean that the closest to a self-contained program you can run is a unikernel like the mirage-firewall, unfortunately. On the upside, those remain easily portable to essentially anything that can run VMs so long as you adjust the image format.
-
I had to relocate CHUNGUS because of the old warehouse I operate it is being torn down.
That sounds similar to a unikernel. There are actual uses for those in seL4 and Qubes OS such as a firewall-qube (in theory unikernel qubes should be able to take far less system resources to run than full Linux+distro qubes).
-
Ask HN: Examples of Microkernels?
Here's one that is "production" ready: the Mirage-Firewall microkernel running on Qubes OS.[0]
[0] : https://github.com/mirage/qubes-mirage-firewall
-
Qubes OS: A reasonably secure operating system
sys-net, sys-firewall and other administrative vms should slowly migrate to unikernels instead of running linux, which should help with ram usage. The mirage.io project seems to build a couple qubes vms, for example https://github.com/mirage/qubes-mirage-firewall is a firewall which they indicate to give 64Mb of ram.
What are some alternatives?
When comparing composite and qubes-mirage-firewall you can also consider the following projects:
lk - LK embedded kernel
miragevpn - An opinionated implementation of the OpenVPN protocol
xv6-riscv - Xv6 for RISC-V
qubes-issues - The Qubes OS Project issue tracker
unikraft - FlexOS is a Unikraft-based OS allowing users to easily specialize the safety and isolation strategy at compilation time.
zCore - Zircon microkernel reimplemented in Rust.
unikernels - MirageOS unikernels
dyld
reason - Simple, fast & type safe code that leverages the JavaScript & OCaml ecosystems
rCore - Rust version of THU uCore OS. Linux compatible.
composite vs lk
qubes-mirage-firewall vs miragevpn
composite vs xv6-riscv
qubes-mirage-firewall vs qubes-issues
composite vs unikraft
qubes-mirage-firewall vs unikraft
composite vs zCore
qubes-mirage-firewall vs unikernels
composite vs dyld
qubes-mirage-firewall vs reason
composite vs rCore
qubes-mirage-firewall vs lk