[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] Re: Xen Security meeting summary


  • To: <xen-devel@xxxxxxxxxxxxxxxxxxxxx>
  • From: "David Lie" <lie@xxxxxxxxxxxxxxxx>
  • Date: Tue, 1 Mar 2005 16:48:39 -0500
  • Delivery-date: Wed, 02 Mar 2005 16:19:16 +0000
  • List-id: List for Xen developers <xen-devel.lists.sourceforge.net>
  • Thread-index: AcUeqG1B7MpUBaBiTpytoO0lsbtp9w==

This was an interesting discussion.  I must be missing something though:

- page mapping visibility: several people said that they felt uncomfortable
with the global visibility of mappings from machine to physical address in a
guest as this provides a lot of information to an attacker.

How does letting an attacker know the physical to machine mappings benefit
an attacker?  I assume the attacker still would not have read/write access
to pages that do not belong to the compromised domain.  Is there a concrete
attack that people are aware of, or is this just a precautionary measure?

Thanks,

David Lie





-------------------------------------------------------
SF email is sponsored by - The IT Product Guide
Read honest & candid reviews on hundreds of IT Products from real users.
Discover which products truly live up to the hype. Start reading now.
http://ads.osdn.com/?ad_id=6595&alloc_id=14396&op=click
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxxx
https://lists.sourceforge.net/lists/listinfo/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.