[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-users] dom0 security


  • To: xen-users@xxxxxxxxxxxxxxxxxxx
  • From: John Levin <xenjohn@xxxxxxxxx>
  • Date: Tue, 25 Oct 2005 20:59:34 -0500
  • Delivery-date: Wed, 26 Oct 2005 01:56:47 +0000
  • Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:message-id:date:from:to:subject:mime-version:content-type:content-transfer-encoding:content-disposition; b=BTmSnq2bDLhfXRjcGKOcYCaWNSH5perzR3ei48Y5TkGgVs5hpyTNbPKDQ2ldj5ejlxSKABUOg/V6u7ycNX8SASYMUsL6q+GTn4s3Qp1fiFnjfTk5pii0kPt8X2E3Q2QQKT28mVDK17KxPni5IDEQ8t28U/kddcmo2SgTryP9WEI=
  • List-id: Xen user discussion <xen-users.lists.xensource.com>

I looked into Xen a little while ago and at that time I think the best
option for limiting dom0 users' access to Xend was just to make dom0 a
control OS only.  Has this changed?  Are there new security features
in Xen3 dom0's?  Are there cool OS tools now to mitigate this problem
by making dom0 able to be really small?

Thankyou for any advice/pointers.

_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.