Live Mode for Kicksecure

From Kicksecure
(Redirected from VM Live Mode)
Jump to navigation Jump to search
Live Mode boot option selectable in boot menu. (more screenshots)

Kicksecure can be booted in Live Mode - a privacy-focused mode where nothing is saved after shutdown, making it ideal for handling sensitive data. This feature is available for both Kicksecure as the host OS and Kicksecure as the guest OS.

Introduction and Definitions[edit]

A live mode offers to use an operating system (OS) without leaving any traces. If the system is started in live mode, all software can be used as normal, files can be saved, tasks can be accomplished, but after the session all data is lost and gone. This is especially important for use cases where sensitive temporary data is involved.

Kicksecure live mode can be used if Kicksecure is a guest OS or a host OS itself. A host operating system (OS) is your main system, like the one you normally boot your computer into. A guest OS runs inside a virtual machine, like an app inside a window. Kicksecure can be booted into live mode in both cases. We will use HOST on this page if Kicksecure is a host OS and we will use VM GUEST if Kicksecure is a guest OS inside a virtual machine.

Live mode is accomplished by use of either,

  • A) ISO Live Mode (see USB Installation); or
  • B) grub-live packagearchive.org iconarchive.today icon (this wiki page), a package that is developed and maintained by the developers of Kicksecure and Whonix. grub-live can also be used by other Linux distributions because it is Freedom Software.

NOTE: This is unfortunately not available in Kicksecure for Qubes, but available in all other Kicksecure variants.

What data will be forgotten?[edit]

Booting into live mode will ensure all disk writes to the virtual hard drive are forgotten after shutdown because all writes go to volatile memory (RAM) instead of the hard disk. In other words, after shutdown everything that happened during a previous boot session is erased - like it never happened. This includes:

  • everything that is created / changed / downloaded
  • any websites visited, files downloaded or documents created
  • any other modifications of the virtual hard drive or activity history
  • This also holds true for malicious changes made by malware. For Kicksecure as VM GUEST also read our chapter #Helpful_tips_against_attack_vectors regarding malware.

Getting Started[edit]

Preparation[edit]

Applicability: These instructions are only needed if you plan to use live mode. If you usually use persistent mode (the default option), you can skip this section.

The very first time you start Kicksecure, make sure to boot it in persistent mode (this option is simply called "Kicksecure"). Do **not** use live mode on first boot. This helps Tor set up properly by setting up so called "Entry Guards."

After that first setup, you can choose to use live mode whenever you want if you prefer that nothing gets saved (this is sometimes called "non-persistence" or "amnesia").

Starting Live Mode[edit]

1. Platform-Specific Notice
2. Boot your computer (HOST) or start the Kicksecure VM (VM GUEST)

If your Kicksecure virtual machine (VM GUEST) is already running, shut it down first. Then start it again to access the boot menu. If you're using Kicksecure as your main system (HOST), just restart your computer.

3. Look at the Boot Menu

When the GRUB boot menu appears (see more on the GRUB bootloader here), wait until you see the menu options. You'll see a list of choices. The currently selected option is marked by an asterisk symbol and shown in white text on a blue background.

Figure: Persistent Mode Boot

Persistent Mode Boot

The boot menu will show something like:

  • Kicksecure GNU/Linux
  • Advanced options for Kicksecure GNU/Linux
  • LIVE mode USER (For daily activities.) GNU/Linux ...

What does the asterisk mean? It marks the option that is currently selected.

Can I select more than one? No — you can only choose one option at a time.

4. Choose Live Mode

Use the keyboard arrow keys (up ↑ and down ↓) to move to the option labeled: LIVE mode USER (For daily activities.).

Figure: Live Mode Boot (non-persistent)

Live Mode Boot

5. Press ENTER

Once live mode is selected, press the Enter key.

6. Done

Kicksecure will now start in live mode — where no data is saved after shutdown.

Functionality Test of Live mode[edit]

If you want to independently verify if live mode is working, follow these steps.

1. Run live mode (see #Starting Live Mode).

2. Create a new file in your /home/user directory.

Could be any file such as for example a small text file.

3. Reboot your machine (HOST). Or restart (via virtualizer) or reboot your Kicksecure VM (both VM GUEST).

4. After then reboot is complete check if you can find that file. If it's gone then live mode is functional.

5. Done.

The live mode functionality test has been completed.

HOST specifics (Kicksecure as host OS)[edit]

Best practices[edit]

It is recommended to use Live mode as a standard for sensitive data use cases. Live mode is also a useful tool for better privacy on the hard drive, as well as experimental changes like testing software.

But it is also recommended regularly boot into persistent mode (for example once per day) for installation of updates.

Live mode undefeated, even by persistent malware[edit]

For some users persistent malware is a concern. A persistent malware compromise after reboot however would require targeted malware which gains super user (root) access to re-mount the disk for write access. But re-mounting the disk for write access is not yet a default feature available to off-the-shelf malware; no such reports have come to our attention.

Boot standard - live mode or persistent mode[edit]

There are two choices:

Kicksecure live mode vs Tails comparison[edit]

Kicksecure live mode is based on the grub-live package which is developed and maintained by the team behind Kicksecure and Whonix. The grub-live package is not only available for Whonix and Kicksecure, but also for many other Linux distributions. To compare Tails and Kicksecure live mode, see grub-live#comparison_between_grub-live_and_Tails.

VM GUEST specifics (Virtual Machine VM)[edit]

VM Live mode and RAM[edit]

Info Tip: Since live mode makes each write go to RAM, increasing the memory assigned to the VM will improve performance; for example, if large files are regularly downloaded.

Anti-Forensics[edit]

VM Live Mode is NOT an anti-forensics feature! This is due to the limitations of the virtual machine. For anti-forensics check out Live Mode as HOST, described above.

Helpful tips against attack vectors[edit]

To keep your live mode unaffected even by malware memorize these instructions and follow them regularly.

Table: VM Live Mode Warnings

Domain Recommendations
Forensics By itself, starting a VM in live mode is not amnesic. Many users are unaware that activities performed inside the VM might be stored on the host mass storage device (hard drive, HDD, SSD) in locations that are hard to review (for the majority). Extra steps must be performed on the host operating system to minimize these traces -- see Anti-Forensics Precautions, or better, use Live Mode as HOST.
Malware To prevent malware from remounting the hard drive as read-write it is strongly recommended to use read-only hard drive mode. This raises the bar as malware would need to break out of the VM to gain persistence, because there might be data leaks if
Other Precautions
  • Kicksecure: It is recommended to regularly boot into persistent mode for installation of updates.
  • Kicksecure: If live mode is used with Kicksecure, regularly booting into persistent mode is important to keep Tor's normal guard rotation schedule.
  • KVM: Hard shutdowns of a VM can prevent loading of the filesystem with a read-only marked drive on next boot. Do not use 'Force Off/Reset' on KVM to avoid this possibility.

VM Live Mode vs VM Snapshots[edit]

Readers of this chapter should already be familiar with Kicksecure live mode, as described in the other chapters on this page, as well as the concept of VM snapshots.

Starting with a clean VM snapshot and later reverting to that snapshot should be even safer than using VM live mode. This is because snapshots are enforced from outside the VM, by the virtualizer. Therefore, snapshots are more secure.

It is also worth noting that running VM live mode uses more RAM than is allocated to the guest, since the OS runs entirely in memory. This means that, in some cases, it is more likely for VM live mode to experience disk thrashingarchive.org iconarchive.today icon, where the VM uses up all the allocated memory and becomes significantly slower. The snapshot approach does not have this issue with RAM.

It is difficult to imagine a case currently where the combination of VM live mode with reverting to a clean snapshot would be even safer. Perhaps in the case of a virtualizer bug with snapshots and/or user error forgetting to revert to a snapshot.

For even greater security, the user could consider Live Mode HOST or even host disk snapshots, such as Raw Disk Backup, although this would unfortunately be more cumbersome and time-intensive.

Troubleshooting[edit]

For known issues, see Live Check Systray Issues.

Host Live Mode in Combination with VM Live Mode[edit]

If the host operating system is booted in live mode, that includes everything that is running on the host. This means it also includes any VMs running on the host.

Therefore it is unnecessary to run VMs in live mode if the host is already running in live mode. The VMs will report that they are not running in live mode but they don't know any better and have no way to know by design.

The user could perform a Functionality Test of Live mode to verify this.

See Also[edit]

Forum Discussion about live mode[edit]

See: Whonix live mode / amnesia / amnesic / non-persistent / anti-forensicsarchive.org iconarchive.today icon

Footnotes[edit]

  1. Qubes issue: implement live boot by porting grub-live to Qubes - amnesia / non-persistent boot / anti-forensicsarchive.org iconarchive.today icon
  2. There are two live mode options available, grub-livearchive.org iconarchive.today icon and ro-mode-initarchive.org iconarchive.today icon.
Notification image

We believe security software like Kicksecure needs to remain Open Source and independent. Would you help sustain and grow the project? Learn more about our 13 year success story and maybe DONATE!