[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] severe security issue on dom0/xend/xm/non-root users



On Sat, Mar 05, 2005 at 04:53:18PM -0500, Rik van Riel wrote:
> Indeed.  I guess I need to think about restricting connections
> to xend to localhost only - and maybe even through a unix
> domain socket instead of a tcp socket ...

This are my thoughts about this problem:

----- Forwarded message from Bastian Blank <waldi@xxxxxxxxxx> -----

Date: Sat, 5 Mar 2005 13:38:11 +0100
Subject: proposal for xend communication

I tried to construct a secure-by-default communication between xm and
xend and for access to the consoles.

Communication channels:
 * Configuration: UNIX/TCP socket with the possibility to connect to consoles.
   (This may violate the HTTP protocol.)
 * Console: UNIX/TCP socket.
 * Migration: TCP socket.

By default only the configuration unix socket is enabled and secured by
filesystem permissions on the containing directory. Anything else needs
to be enabled in the config. The domain console option is predefined as
empty.

The domain config console option is changed to a socket spec.
(Examples: 'unix:/tmp/bla', 'tcp::6703', 'tcp:0.0.0.0:6704',
'tcp:192.168.1.2:6705')

Don't know yet how to specify the configuration and migration sockets in
the overall config.

----- End forwarded message -----

Bastian

-- 
He's dead, Jim.
                -- McCoy, "The Devil in the Dark", stardate 3196.1

Attachment: signature.asc
Description: Digital signature


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.