[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Publicity] Stealthy monitoring with Xen altp2m
On 01/25/2016 10:51 PM, Lengyel, Tamas wrote: > This solution, while supported in Xen, is not particularly ideal either > as Xen's emulator is incomplete and is known to have issues that can > lead to guest instability [2]. Furthermore, over the years emulation has > been a hotbed of various security issues in many hypervisors (including > Xen [3]), thus building security tools based on emulation is simply > asking for trouble. It can be handy but should be used only when no > other option is available. I still don't feel that building security tools based on emulation is asking for trouble, for obvious reasons. :) And I think it can be argued that link [2], pointing to a message posted on xen-devel, does not prove that the emulator is particularly problematic, but rather that a problem exists with a corner case (as my reply to that message tries to point out). Furthermore, as discussed with Tamas in private today, altp2m tests I've written today crash my guest no less than Tamas' emulator code, in a similarly obscure manner. I'm just wondering if altp2m, which is certainly very interesting and valuable, could not be presented more based on it's intrinsic uniqueness and strengths, rather than in battle with alternatives to be defeated, though of course it's not my article to write or my decision to make, and I respect everyone's opinion. Thank you, Razvan _______________________________________________ Publicity mailing list Publicity@xxxxxxxxxxxxxxxxxxxx http://lists.xenproject.org/cgi-bin/mailman/listinfo/publicity
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |