[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-users] Amazon PVMs magically weren't affected by XSA 182 vuln
On 09/27/2016 06:20 AM, George Dunlap wrote: On Fri, Sep 23, 2016 at 3:34 PM, Chris Laprise<tasket@xxxxxxxxxxxxxxx> wrote:On 09/23/2016 09:42 AM, Ian Murray wrote:________________________________ From: Chris Laprise<tasket@xxxxxxxxxxxxxxx> To:xen-users@xxxxxxxxxxxxx Cc: Joanna Rutkowska<joanna@xxxxxxxxxxxxxxxxxxxxxx> Sent: Friday, 23 September 2016, 14:09 Subject: [Xen-users] Amazon PVMs magically weren't affected by XSA 182 vuln Hello list... Has anyone seen a good explanation as to why Amazon services were not vulnerable to XSA182 / CVE-2016-6258 ? I understand they offer PV guests on x86.Perhaps because they get to patch before most people, as they are in the pre-disclosure list? https://www.xenproject.org/security-policy.htmlAnd yet, an XSA can trigger updates at AWS that require explanation of the disruption... https://aws.amazon.com/blogs/aws/ec2-maintenance-update-2/ So I wondered if in some cases Amazon's in-house versions may not have been vulnerable in the first place.It's worth pointing out that everything said here is conjecture, as nobody from Amazon has said anything authoritative. That said, there's some interesting tidbits here: http://www.networkworld.com/article/2892313/cloud-computing/what-happens-inside-amazon-when-there-s-a-xen-vulnerability.html Key quotes: "Most of the Xen vulnerabilities do not apply to AWS because the company has developed its own custom version of Xen. AWS has stripped out all the features of Xen that it doesn’t need, both in order to customize the performance of the open source code to the company’s unique use case, and to limit its exposure to vulnerabilities. " "Schmidt said AWS is always looking to improve its services: both technically to ensure it doesn’t have to reboot VMs, and it is working to keep customers better informed. Part of that process includes sponsoring academic research, including some leading studies into how Xen servers can be hot-patched without requiring a reboot. " So two potential explanations for why they were not vulnerable: 1. They may have disabled the feature, so that they were never vulnerable 2. They may have used an internal hot-patching mechanism to apply the patch without rebooting, so that the statement "we are not vulnerable" was accurate at the time the vulnerability was publicly announced. :-) -George First, being able to hot-patch doesn't mean they weren't vulnerable before the patch. "Not affected" will be read by most as "was not vulnerable". And Qubes OS, with its minimal-attack surface philosophy, has also disabled a lot of Xen features. Yet it is still affected by (i.e. vulnerable to) occasional Xen vulnerabilities that AWS is not. I'm sure the Qubes community (and possibly Citrix) would like to know details as to why. The Network World article doesn't inspire any confidence that information will come from Amazon, however. Through it, Amazon declares they have special-sauce Xen implementations that have been more secure. And that is as far as it goes in addressing Amazon's role as a Xen developer, which is the most important aspect of this issue. The relationship between Amazon and Xen appears to be an unhealthy one that is ripe for abuse: https://news.ycombinator.com/item?id=9358843So we have a number of Xen devs saying they accept /unattributed/ patches from Amazon, on top of their security through obscurity. That just seems untenable to me, like a zero-day magnet. Chris _______________________________________________ Xen-users mailing list Xen-users@xxxxxxxxxxxxx https://lists.xen.org/xen-users
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |