|
|
|
|
|
|
|
|
|
|
xen-devel
Re: [Xen-devel] [Xense-devel][RFC][PATCH][1/4] Xen Security Modules: XSM
Reiner Sailer wrote:
<snip>
XSM would effectively replace the small set of hooks that the
sHype/ACM module introduced with a more generic mediation framework.
sHype would use the XSM hook framework to control the same operations
that it controls now. The way users interact with sHype(XSM) (tools,
policies, labeling, ...) would not be affected by XSM. Instead of
being both hooks and security module, sHype(XSM) would be a security
module and XSM would offer the hooks.
Ideally, XSM would be a standardized and generic Xen interface that
offers the possibility for researchers to easily experiment with
proprietary security modules. At the same time, it must have very low
performance overhead and be effective to support enterprise security
on highly utilized platforms.
It is very good for starting the discussions that George and team
succeeded to submit their code before the Xen Summit. Thank you!
The XSM concept looks good for prototyping and research but any
security-related additions to Xen should be done in a way that does not
increase the _minimum_ size of the code base. A small code base is
essential for high assurance; having the flexibility of XSM is good but
it should be possible to build a Xen with something smaller than XSM. If
XSM or other security enhancements become too deeply associated with the
core of Xen then we loose the chance to build high-assurance Xen-based
products.
This is really an issue about what kind of security the hypervisor
should enforce and what should be enforced by trusted or untrusted (wrt
the hypervisor) mechanisms outside the hypervisor.
Sincerely,
John
--
J.P. McDermott building 12
Code 5542 mcdermott@xxxxxxxxxxxxxxxx
Naval Research Laboratory voice: +1 202.404.8301
Washington, DC 20375, USA fax: +1 202.404.7942
_______________________________________________
Xense-devel mailing list
Xense-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xense-devel
|
|
|
|
|