|
|
|
|
|
|
|
|
|
|
xense-devel
RE: [Xense-devel] Shype/ACM for HVM guest.
"Praveen Kushwaha" <praveen.kushwaha@xxxxxxxxxxx>
wrote on 04/06/2007 08:26:38 AM:
>
> Hi,
> Thanks
for replying.
> According
to you in case of full virtualization
> security checks are only applied at the startup of virtual machine.
> Where
as in para virtualization security checks are also
> at the hypercalls. But in full virtualization currently there
is no
> security checks
>
like para virtualization. I do believe that there is
> Chinese wall security hooks, but they only manage the starting of
> HVM domains.
> Do
you also mean that ACM has no role to play in case of
> HVM domains?
We are not saying that it 'has no role to play'. The
current ACM support for HVMs is limited and we will investigate this in
the future.
> and
also the hypervisor has no security checks on the
> request fron HVM guest to hypervisor?
A fully virtualized guest will currently not run through
the types of ACM hooks that paravirtualized domains are running through.
Stefan
>
> Thanks,
> Praveen Kushwaha
>
> From: Stefan Berger [mailto:stefanb@xxxxxxxxxx]
> Sent: Friday, April 06, 2007 5:32 AM
> To: Praveen Kushwaha
> Cc: xense-devel@xxxxxxxxxxxxxxxxxxx; xense-devel-bounces@xxxxxxxxxxxxxxxxxxx
> Subject: RE: [Xense-devel] Shype/ACM for HVM guest.
>
>
> "Praveen Kushwaha" <praveen.kushwaha@xxxxxxxxxxx>
wrote on
> 04/04/2007 02:53:06 AM:
>
> > Hi,
> > Yes, the Chinese wall
policy hook is there for checking
> > whether the HVM guest is allowed to run or not.
> > But the my question
is that suppose the HVM guest wants
> > to do some IO (disk access, printer etc). Then for the
> communicationwith the
> > VMM, VMExit will happen
( A transition from the HVM
> > guest to VMM is done). Then, Where the shype/ACM put hooks in
order
> > to have control over
> > resources(IO devices)
for the HVM guests?
>
> IO devices that are connected to the HVM and whose parameters are
> provided through the VM configuration can be checked against their
> labeling once a domain is started using xend. Currently for HVMs
> only disk entries are checked. More will need to be added in this
> area in the future.
>
> > As it puts hooks on
hypercalls in case of paravirtualization.
> > What shype/ACM does
in case of full virtualization?
>
> In case of full virutalization, the hooks on the hypercalls for
> grant tables and event channels are not being used. So oin HVM case,
> checks are only done during startup of a virtual machine.
>
> Stefan
>
> >
> > Thanks,
> > Praveen Kushwaha
> >
> >
> >
> >
> >
> > From: Stefan Berger [mailto:stefanb@xxxxxxxxxx]
> > Sent: Tuesday, April 03, 2007 8:29 PM
> > To: Praveen Kushwaha
> > Cc: xense-devel@xxxxxxxxxxxxxxxxxxx; xense-devel-bounces@xxxxxxxxxxxxxxxxxxx
> > Subject: RE: [Xense-devel] Shype/ACM for HVM guest.
> >
> >
> > "Praveen Kushwaha" <praveen.kushwaha@xxxxxxxxxxx>
wrote on
> > 04/03/2007 05:42:56 AM:
> >
> > > Hi,
> > > Yes that
is fine if the paravirtualized drivers are
> > > used in HVM then we can put hooks on that. But it is different
case,
> > > how actually shype/ACM works in case of VMExit/VMEntry.
> > > Since in
case of VMExit/VMEntry there are no
> > > hypercalls, then how sHype/ACM implements security.
> > > I mean
to ask that how sHype/ACM works in case of
> HVM guest.
> >
> > In case of an HVM guest you would have the Chinese Wall Policy
hooks
> > checking whether the HVM guest is allowed to run with its current
VM label.
> > Access to resources such as image files is also checked when
a
> > virtual machine is started up.
> >
> > Stefan
> >
> >
> > >
> > > Thanks,
> > > Praveen Kushwaha
> > >
> > >
> > >
> > >
> > >
> > >
> > >
> > > From: Stefan Berger [mailto:stefanb@xxxxxxxxxx]
> > > Sent: Monday, April 02, 2007 7:19 PM
> > > To: Praveen Kushwaha
> > > Cc: xense-devel@xxxxxxxxxxxxxxxxxxx; xense-devel-bounces@lists.
> xensource.com
> > > Subject: Re: [Xense-devel] Shype/ACM for HVM guest.
> > >
> > >
> > > xense-devel-bounces@xxxxxxxxxxxxxxxxxxx wrote on 04/02/2007
05:40:39 AM:
> > >
> > > > Hi,
> > > > Does Shype/ACM
architecture for implementing security in
> > > > xen supports HVM guest also? I mean to say that,
as per my
> > >
> > > HVM guests are supported in so far that the configuration
of an HVM
> > > is checked when the VM is started. This is done in xend
where
> > > resource assignments (disk access) are validated.
> > >
> > > > knowledge in xen 3.0.4
shype/ACM is implemented. Does this
> > > > shype/ACM work also for the HVM (windows) guest?
> > > > As
per my understanding shype/ACM puts hook on
> > > > hypercalls from the hypervisor, and consult with the
ACM. But in
> > > > case of full virtualization, hypervisor does not have
hypercalls to
> > > > communicate with HVM guest. There is VMEntry/VMExit
for
> > >
> > > This is correct. Though, if paravirtualized drivers are
used in an
> > > HVM, also they will need to go through the hooks for grant
table
> > > access and event channels.
> > >
> > > Stefan
> > >
> > >
> > > > communication, in which guest state and host state
are saved. Since
> > > > there are no hypercalls in case of full virtualization
then how the
> > > > actually shype/ACM works. Where does it put hooks?
Or is there any
> > > > other mechanism through which it implements security
in HVM guest.
> > > > If any one has information regarding
it please reply.
> > > >
> > > > Thanks,
> > > > Praveen Kushwaha
> > > >
> > > >
> > > >
> > > > _______________________________________________
> > > > Xense-devel mailing list
> > > > Xense-devel@xxxxxxxxxxxxxxxxxxx
> > > > http://lists.xensource.com/xense-devel_______________________________________________
Xense-devel mailing list
Xense-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xense-devel
|
|
|
|
|