WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

Re: [Xen-devel] [PATCH] xen-2.0: privileged port connections

To: Anthony Liguori <aliguori@xxxxxxxxxx>
Subject: Re: [Xen-devel] [PATCH] xen-2.0: privileged port connections
From: Kurt Garloff <garloff@xxxxxxx>
Date: Wed, 23 Mar 2005 17:57:39 +0100
Cc: Xen development list <xen-devel@xxxxxxxxxxxxxxxxxxxxx>
Delivery-date: Wed, 23 Mar 2005 17:02:11 +0000
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <42418E24.5070906@xxxxxxxxxx>
List-archive: <http://sourceforge.net/mailarchive/forum.php?forum=xen-devel>
List-help: <mailto:xen-devel-request@lists.sourceforge.net?subject=help>
List-id: List for Xen developers <xen-devel.lists.sourceforge.net>
List-post: <mailto:xen-devel@lists.sourceforge.net>
List-subscribe: <https://lists.sourceforge.net/lists/listinfo/xen-devel>, <mailto:xen-devel-request@lists.sourceforge.net?subject=subscribe>
List-unsubscribe: <https://lists.sourceforge.net/lists/listinfo/xen-devel>, <mailto:xen-devel-request@lists.sourceforge.net?subject=unsubscribe>
Organization: SUSE/Novell
References: <20050323123639.GM12479@xxxxxxxxxxxxxxxxx> <42418E24.5070906@xxxxxxxxxx>
Sender: xen-devel-admin@xxxxxxxxxxxxxxxxxxxxx
User-agent: Mutt/1.5.6i
Hi Anthony,

On Wed, Mar 23, 2005 at 09:41:24AM -0600, Anthony Liguori wrote:
> So, here's my concerns:
> 
> 1) ports < 1024 are reserved although 732 is currently unassigned

Note that NFS uses such ports without asking prior permission.
I chose 732 because it's unassigned indeed.

> 2) unix domain sockets would solve the same problem

Yes. There's one but: 

With the patch you can currently configure xend from completely
open (xend-address '' and xend-privileged-port 0)
to closed (xend-address 'localhost' and xend-privileged-port 1)
except for root (and stuff I overlooked or did not do yet).

If you go for Unix Domain Sockets instead TCP, you lose the ability
of remote control. Unless you support both.

I did not investigate how difficult to do that would be.
If you have a patch, I'd volunteer to review :-)

> 3) this approach is not flexible for finer grain control

sudo, setuid, ... can provide that.

> 4) you still have to find a way to deal with the consoles

Before I start working on getting the consoles under control, I 
wanted to see whether this approach is acceptable at all.

> 5) you still have to deal with xfrd

It seems to listen on *:8002 ... 
Is there no authentication either? Sigh.

And we probably need to look into the event channel (8001) as well.

> With all that said, I'd like to see this applied as it's better than 
> leaving everything out in the open.

For Xen-3.0, we may want to carefully chose what kind of backend (xend)
to frontend (xm) communication channels we want to allow and how
authentication and authorization is handled there.

But for Xen-2, let's try to find a pragmatic way that enables desktop
users to install and test xen without raising too many security 
concerns.

Regards,
-- 
Kurt Garloff, Director SUSE Labs, Novell Inc.

Attachment: pgpspivKNGCfb.pgp
Description: PGP signature