[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: [Xen-users] RE: If a DomU was compramised..



> -----Original Message-----
> From: xen-users-bounces@xxxxxxxxxxxxxxxxxxx [mailto:xen-users-
> bounces@xxxxxxxxxxxxxxxxxxx] On Behalf Of Matthew Law
> Sent: Thursday, May 20, 2010 11:55 AM
> To: vburke@xxxxxxxx
> Cc: xen-users-bounces@xxxxxxxxxxxxxxxxxxx; Jonathan Tripathy; xen-
> users@xxxxxxxxxxxxxxxxxxx
> Subject: Re: [Xen-users] RE: If a DomU was compramised..
> 
> I agree with Vern although I would go as far as to say that even with
> exceptionally good security and admin practices in place I think that
if
> someone really wants to get in and has the skill, they will,
eventually.

Indeed.  The security of any host tends to be only as good as the
network, storage device, and physical facilities.  If you can compromise
any of those, then little else matters.

I don't think virtualization has much to do with this argument.  Most
data centers have some systems in place for remote access, such as KVM
over IP, and it seems certain these have also been targeted for
vulnerabilities.  I don't have any technical basis to trust a hypervisor
less than a serial console or KVM.

-Jeff



_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.