[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Publicity] Docker Open Source Container Virtualization on the Rise



>@Russell, maybe you can add a couple of slides to the security talk

I will definitely give it a shot when I get back home.

On Thu, Feb 13, 2014 at 12:58 AM, Lars Kurth <lars.kurth@xxxxxxx> wrote:
> Hi all,
> thanks for the contributions. This is very valuable.
> https://lwn.net/Articles/524952/ is well worth a read! Thank you Tzach
> @Sarah, is this enough?
> @Russell, maybe you can add a couple of slides to the security talk
> Lars
>
>
> On 12/02/2014 13:55, Anil Madhavapeddy wrote:
>>
>> On 12 Feb 2014, at 08:44, Ian Campbell <Ian.Campbell@xxxxxxxxxx> wrote:
>>
>>> On Tue, 2014-02-11 at 19:42 +0000, Anil Madhavapeddy wrote:
>>>>
>>>> Perhaps the simplest thing is to look for a list of recent CVE
>>>> vulnerabilities and highlight which ones would be blocked by Xen, KVM
>>>> and containers.
>>>
>>> One thing worth remembering is that while Xen has a well defined
>>> security response process[0] and is proactive and transparent about
>>> issuing advisories (and CVEs) for anything which we become aware of,
>>> even relatively minor issues, while I don't believe the same can be said
>>> of Linux and by extension containers.
>>>
>>> AFAIK security fixes to Linux are made, deliberately and explicitly, in
>>> a very low key way and appear as any other bugfix. They are not
>>> highlighted as security relevant and mention of a CVE or security aspect
>>> is routinely stripped from the commit log comments. CVEs are issued
>>> after the fact, if at all, when someone who is watching the commit
>>> stream spots it, realises the security impact, and requests it for
>>> themselves/their distro/etc or when the original author does so
>>> independently.
>>>
>>> So the risk is that Xen CVEs will be over represented in the set of
>>> CVEs. On the other hand maybe the sheer volume of CVEs means that even
>>> if they are under reported there are loads of them anyway...
>>
>> I think that's an excellent point.  The flipside is to look at exploit
>> sets instead, which are basically independent of security processes.
>>
>> A quick look at Metasploit shows this collection:
>> https://github.com/rapid7/metasploit-framework/tree/master/modules
>>
>> ...which sadly (?) doesn't include Xen or KVM, or any other hypervisors,
>> but I'm sure there must be a similar set elsewhere.
>>
>> -anil
>>
>> _______________________________________________
>> Publicity mailing list
>> Publicity@xxxxxxxxxxxxxxxxxxxx
>> http://lists.xenproject.org/cgi-bin/mailman/listinfo/publicity
>
>
>
> _______________________________________________
> Publicity mailing list
> Publicity@xxxxxxxxxxxxxxxxxxxx
> http://lists.xenproject.org/cgi-bin/mailman/listinfo/publicity

_______________________________________________
Publicity mailing list
Publicity@xxxxxxxxxxxxxxxxxxxx
http://lists.xenproject.org/cgi-bin/mailman/listinfo/publicity


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.