[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] Re: Module loading in unpriveledged domains
I don't think the original poster truly understands how xen works, otherwise they wouldn't have asked about module loading and it's security implications in xen. This isn't another vserver or uml project. It doesn't matter what you do with the individual guest kernels. The fact of the matter is that they have no authority (unless they are a privileged domain) to affect xen's security. Now bugs in xens security enforcement methods *might* be exploitable, but from what I can see this is a fairly easy area to audit. The use of event channels makes it tougher than usual for a unprived domain to break into a backend driver domain. That of course would be easilly audited as well. With the page wiping in xen 2.0.x now, I don't see how a domain could exploit anything in xen with used memory that is handed back to xen from drivers. I don't know of any areas of xen that attempt to execute code from allocated memory blocks that a domain hands to xen directly. I can't imagine any other method to comprimise the xen hypervisor. Anyone else as or more familiar with the main hypervisor kernel aware of, or can image ways to bust through it's security? my 0.2 cents of admittedly limited understanding of xen'd security and methods... Brian On Tue, 2004-11-23 at 18:43 +0200, Nuutti Kotivuori wrote: > David Hopwood wrote: > > True, unless there are bugs that cause different behaviour depending > > on whether a module is compiled-in or loaded (such as > > <http://lists.jammed.com/linux-security-module/2003/12/0012.html>). > > Nevertheless enabling loadable modules may allow a greater > > proportion of script kiddies to be capable of exploiting any given > > bug. > > > > This is all the same as in standard Linux, so perhaps I should have > > said: enable loadable modules iff you would do so in standard Linux. > > That's a bit of an odd comment I think. > > Enabling module loading has security implications for the actual Linux > system being exploited - eg. either the physical machine in a > standalone case, or a Xen guest virtual machine. > > But the original question was not about the security of that machine, > but about the possibility of escalation of that exploin into other > Xen guests or the domain 0 on the same physical machine. > > So for the escalation case, in both cases we are talking about a fully > exploited Xen guest virtual machine trying to break out of Xen > separation - and in that case, I don't see how module loading makes > any difference. > > So the complete answer would be - yes, module loading in unpriviledged > domains has security implications in unpriviledged domains as much as > it has on standard Linux machines - but no, module loading in > unpriviledged domains has no security implications with regard to > other machines running on the same host, aside from those normally > incurred by Xen. > > And I think the latter part of the answer was what the original poster > intended. > > -- Naked > > > > ------------------------------------------------------- > SF email is sponsored by - The IT Product Guide > Read honest & candid reviews on hundreds of IT Products from real users. > Discover which products truly live up to the hype. Start reading now. > http://productguide.itmanagersjournal.com/ > _______________________________________________ > Xen-devel mailing list > Xen-devel@xxxxxxxxxxxxxxxxxxxxx > https://lists.sourceforge.net/lists/listinfo/xen-devel -- ------------------------------------------------------- SF email is sponsored by - The IT Product Guide Read honest & candid reviews on hundreds of IT Products from real users. Discover which products truly live up to the hype. Start reading now. http://productguide.itmanagersjournal.com/ _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxxx https://lists.sourceforge.net/lists/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |