[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-users] Running workstation and firewall on the same hardware
> > the case of the firewall domain being compromised, however, a > > "sufficiently clever" attacker can probably abuse the DMA engine of the > > network card to "break out" of the domU. > > This is interesting. How robust is the isolation between domains and > what are the possible risks? If you don't give a domain any real devices, isolation there should (modulo obscure bugs) be no way to break out. The problem is that modern DMA-capable devices can access any memory in the system, so as soon as you give a domain access to a PCI card, you're basically trusting it not to fool about with your memory. This is a limitation of modern hardware - future chipsets will likely have better controls for restricting DMA. Also, Harry's USB virtualisation code won't have this limitation when it's checked in (because it's easier to restrict DMA for USB devices). > From what you wrote it seems that allowing > domU access to the hardware is more risky than passing all packets to > domU through dom0. Depends... I guess if you trust that nothing can compromise the path in dom0 from eth0 to the domU's virtual ethernet then this is actually the case. As Goetz pointed out, though, it'd require a reasonably sophisticated attacker to break out of a domain using DMA. Bear in mind that if you're not running any services in the firewall domU, the only way it could get compromised is by a network-stack attack. It still fulfills the goal of protecting your bloatware (your words!) from the internet... > Say that I've got two domUs - one in DMZ and one in the Intranet, > DMZ-domU has a dedicated NIC, intra-domU uses vif provided by dom0. What > are the risks of breaking out of DMZ to the Intranet? If a domain has a DMA capable card a sophisticated attacker can theoretically own the whole machine - there is no sensible way to control DMAs on current hardware. I should point out nobody has ever done this but it is possible. HTH, Mark _______________________________________________ Xen-users mailing list Xen-users@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-users
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |