[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] Re: Regarding Xen security....
> > The vast majority of this is, as Keith Adams put its, "quasi-illiterate > > gibberish." > > > > http://x86vmm.blogspot.com/2006/08/blue-pill-is-quasi-illiterate.html > > > > Having VT/SVM doesn't really change anything wrt rootkits. Most of what > > is floating around is FUD. There's nothing you can do today that you > > couldn't do before VT/SVM. > > This is true in some manner, it's just that VT/SVM let a rootkit hide > itself pretty well from the operating system that it is already > attacking. But no doubt it's FUD. At the other end though, Intel > invests a lot of efforts in marketing VT as a synonym for security. I always thought the principle behind blue pill was quite sensible. It's not demonstrating a fundamental flaw / bug in the hardware design (I'm not sure it was originally presented that way, although I've certainly seem it treated as if it did). I see it as just a (rather neat and clever) proof of concept to show that the VMX/SVM extensions add a new class of attack and a new stealth mechanism for rootkits; no more no less. A heads-up to the security community. And worth pointing out, since existing rootkit detection mechanisms may not be able to detect it once the VMX stealthing is enabled... I have a feeling that this research has both been reported to be much more, and much less than it really is. The important thing is that it doesn't open a new loophole, but does provide a new tool for attackers (and for defenders!). Cheers, Mark -- Dave: Just a question. What use is a unicyle with no seat? And no pedals! Mark: To answer a question with a question: What use is a skateboard? Dave: Skateboards have wheels. Mark: My wheel has a wheel! _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |