[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Improving XCP [was Re: [Xen-users] XCP: Insecure Distro ?]

Picking up on some of your other points:

Yes, Xen documentation sucks big-time. For example, it's impossible to find 
what boot methods are available (pygrub, pvgrub, etc.), what works with what, 
and what's obsolete. Of course, saying "somebody ought to..." is a time-honored 
way of volunteering :) You up to it? Time, enthusiasm, and being able to work 
with people are more important than deep knowledge, IMHO.

Further hardening of dom0 is a really interesting idea. For example, is there 
really any need for a shell? Any need for any users who can do a 
general-purpose log-in? All we want is to start, stop, monitor, and configure 
domUs. Even grub has a lot of extra junk in it. Talking about what we want is 
appropriate for xen-users, methinks. Xen-dev can tackle hiw to implement.

What do folks think?

Michael South

On May 11, 2011, at 16:45, Adrien Guillon <aj.guillon@xxxxxxxxx> wrote:

>> In this case, adding a shadow file will not actually increase security. The 
>> best it could do would be to provide "check the box" "warm and fuzzies" for 
>> people who do not understand shadow's purpose. As such, it would be a 
>> _false_ sense of security. This may be the case here; "if I have shadow 
>> files, then it's safe to expose the dom0 login to the bare internet."
> I don't believe this, rather I believe that if any daemon has a
> problem at all... literally anything since it's globally readable...
> the hash can be exposed.  I think that the discussion started to go
> onto a tangent on security of management interfaces and all of these
> topics which are indeed important, but tangential.  The security of
> the system is now determined by the lowliest application, some defunct
> Perl script running as "nobody" can now expose a password hash.  Yes,
> as we discussed, we can isolate the network.  But I think you all have
> to see that even with it isolated, the problem is still there.
> As evidenced by this thread, there is quite a bit of good information
> on "how Xen is meant to be used" which was not evident to me in the
> documentation that I read.  I think that a nice wiki page on "best
> practices" or "suggested setup" could convey to the rest of the world
> what you have taken the time to convey to me.  Heck, someone can
> probably write a nice article based on some of the ideas brought up in
> this thread.  This would do a lot for others who are looking at Xen as
> I was.
> I still will not budge on the problems with /etc/passwd.  I understand
> the evidence and arguments presented.  However, the issue is that any
> user (I'm talking system users, not people here) can get access, even
> if it is on "the internal network".  We have discussed the need to
> separate a potentially insecure interface from the "big bad Internet",
> and I agree fully with this.  However, in my view there is still a
> problem.  It's like saying "yes, yes... if you ping the system it will
> email you the password... but we don't allow ping see, we put it on a
> separate isolated network where ping is not allowed... where do you
> see a problem?!"  I believe, personally, this is avoidance of a
> problem, and when it comes to open-source software I think problems
> should be confronted, that is why I am here.
> Regarding updates, could it be that shifting XCP to a Debian-based
> distribution will help?  I admit I have some bias, since I prefer
> Debian-based distros (although I did have a fling with Gentoo for a
> few years, but it's over between us).  Should we, perhaps, make a
> concerted effort to adjust XCP to be a hardened distro rather than
> just a fork of something put out by Citrix?  This discussion likely
> belongs on the devel list, but I just wanted to put it out there.

Xen-users mailing list



Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.