[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-users] Exploiting XEN



> > > The Xen hypervisor is fairly small, and thus relatively easy to
> > > understand and control against vulnerabilities. Since it's living
> > > "outside" the host-OS that it controls, it's potentially
> >
> > less vulnerable
> >
> > > than those hypervisors that live within the host-OS.
> >
> > Nice in theory, but in practice you have to include Dom0 as (at this
> > time) it has effectively unrestricted access to the hardware and is
> > neccessarily trusted by every DomU that cards about disk or network
> > I/O. While in theory Xen may allow a tighter security model, in the
> > real-world deployments of Xen there's no better security from its
> > arch of hypervisor outside the Dom0 OS, vs other virt systems which
> > have the hypervisor as part of  the Dom0.
>
> I guess that's a fair comment too. Dom0 is a large part of a Xen
> environment, and if Dom0 is compromised, then Xen can't really do that
> much to prevent the system from being crashed, subverted or other
> malicious acts. But I believe Xen itself is "safe" from Dom0 being
> compromised - but it's moot point, as Xen on it's own is about as useful
> as a chocalte teapot.

We don't make any real effort to protect the system from a naughty dom0 at 
this point - there's no point whilst it's permitted to DMA over any memory it 
wants.  With domain 0 disaggregation and IOMMU hardware we should be able to 
harden the system significantly with respect to what harm dom0 and driver 
domains can do.

For a random related reference, 
[http://www.cs.rochester.edu/meetings/sosp2003/papers/p134-lie.pdf] describes 
an implementation of an untrusted operating system: the researchers goal was 
(with hardware support) to produce an OS that was as limited as possible WRT 
interfering with applications in certain ways whilst still providing 
essential OS services.  It's an interesting read.

Cheers,
Mark

> But Xen isn't really the "culprit" in this scenario - it's the same
> scenario for Linux (or whatever other OS we care to choose) without a
> hypervisor.
>
> --
> Mats
>
> > Dan.
> > --
> >
> > |=- Red Hat, Engineering, Emerging Technologies, Boston.  +1
> >
> > 978 392 2496 -=|
> >
> > |=-           Perl modules: http://search.cpan.org/~danberr/
> >
> >             -=|
> >
> > |=-               Projects: http://freshmeat.net/~danielpb/
> >
> >             -=|
> >
> > |=-  GnuPG: 7D3B9505   F3C9 553F A1DA 4AC2 5648 23C1 B3DF
> >
> > F742 7D3B 9505  -=|
>
> _______________________________________________
> Xen-users mailing list
> Xen-users@xxxxxxxxxxxxxxxxxxx
> http://lists.xensource.com/xen-users

-- 
Dave: Just a question. What use is a unicyle with no seat?  And no pedals!
Mark: To answer a question with a question: What use is a skateboard?
Dave: Skateboards have wheels.
Mark: My wheel has a wheel!

_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.