[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] Re: Regarding Xen security....



Mark Williamson wrote:
The vast majority of this is, as Keith Adams put its, "quasi-illiterate
gibberish."

http://x86vmm.blogspot.com/2006/08/blue-pill-is-quasi-illiterate.html

Having VT/SVM doesn't really change anything wrt rootkits.  Most of what
is floating around is FUD.  There's nothing you can do today that you
couldn't do before VT/SVM.
This is true in some manner, it's just that VT/SVM let a rootkit hide
itself pretty well from the operating system that it is already
attacking. But no doubt it's FUD. At the other end though, Intel
invests a lot of efforts in marketing VT as a synonym for security.

I always thought the principle behind blue pill was quite sensible. It's not demonstrating a fundamental flaw / bug in the hardware design (I'm not sure it was originally presented that way, although I've certainly seem it treated as if it did).

I'm a bit bias on the subject but the author did announce her work with a paper claiming "100% undetectable malware". That simply isn't true.

Discussing the practicality of hiding malware is certainly an interesting and research worthy topic. However, IMHO, VT/SVM really doesn't make it any easier than it was in the past.

You could always hook the IDT. That is considerably easier than setting up a full VT/SVM environment.

Regards,

Anthony Liguori


I see it as just a (rather neat and clever) proof of concept to show that the VMX/SVM extensions add a new class of attack and a new stealth mechanism for rootkits; no more no less. A heads-up to the security community. And worth pointing out, since existing rootkit detection mechanisms may not be able to detect it once the VMX stealthing is enabled...

I have a feeling that this research has both been reported to be much more, and much less than it really is. The important thing is that it doesn't open a new loophole, but does provide a new tool for attackers (and for defenders!).

Cheers,
Mark



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.