|  |  | 
  
    |  |  | 
 
  |   |  | 
  
    |  |  | 
  
    |  |  | 
  
    |   xen-users
RE: [Xen-users] XCP Xen Cloud Control System ver 0.3 released! 
| 
You could try this:   Don't know if it will stop DHCP broadcasts, but 
maybe... 
 From: Vern Burke 
[mailto:vburke@xxxxxxxx]
 Sent: Tue 25/05/2010 15:04
 To: 
matt@xxxxxxxxxxxxxxxxxx
 Cc: Jonathan Tripathy; 
xen-users@xxxxxxxxxxxxxxxxxxx
 Subject: Re: [Xen-users] XCP Xen Cloud 
Control System ver 0.3 released!
 
 
 
I only do static IP assignments on the VMs. I have no idea how 
you'dstop a VM from running a DHCP server from outside the VM (not that I 
can
 imagine why anyone would want to do that anyways). The best answer 
I've
 found for a lot of shennanigans is a zero tolerance policy in the 
terms
 of service (do it and you're gone, period).
 
 Openflow looks like 
it might be useful except I'm not seeing much for
 controllers. I'm still 
pondering how to make best use of the
 capabilities of 
openvswitch.
 
 XCCS multitenancy will provide a reduced set of functions to 
customers
 for controlling their own VMs with the end goal being self 
provisioning
 and automatic billing.
 
 Vern
 
 
 On 5/25/2010 4:49 
AM, Matthew Law wrote:
 > Hi Verne,
 >
 > a fine 
job!
 >
 > Do you assign domU addresses from a DHCP server and if so 
how do you stop
 > a rogue VM from running it's own DHCP server and 
answering DHCP requests
 > from other domUs as they start 
up?
 >
 > The default config for XCP does let a domU spoof IP 
addresses.  I asked
 > some questions on the openvswitch list recently 
and I get the impression
 > that with a separate flow controller box you 
could do some quite
 > fine-grained control of network properties even 
through migration.
 >
 > What plans do you have for the multi-tenancy 
side of things? - if you need
 > any help with database development or the 
web frontend I would be more
 > than willing to help out (thats my 
background).
 >
 >
 > Cheers,
 >
 > 
Matt
 >
 > On Mon, May 24, 2010 11:09 pm, Vern Burke 
wrote:
 >
 >> 
Jonathan:
 >>     I don't think there's much to do 
about preventing someone breaking out
 >> of a DomU. As I've said 
before, that would have to be a severe fubar of
 >> the hypervisor and 
it's not likely.
 >>
 >> Protecting the Dom0 is really nothing 
more than the standard best
 >> practices for any Internet connected 
server.
 >>
 >> If you're really concerned about packet sniffing 
you could always use a
 >> private vswitch and use a Vyatta virtual 
router and VPN out to wherever
 >> you're going.
 >>
 >> 
Vern
 >> Sent from my BlackBerry® wireless device from U.S. 
Cellular
 >>
 >
 >
 >
 
 
 _______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users | 
 |  | 
  
    |  |  |