|  |  | 
  
    |  |  | 
 
  |   |  | 
  
    |  |  | 
  
    |  |  | 
  
    |   xen-devel
Re: [Xen-devel] [PATCH][ACM] kernel enforcement of	vbd	policies	via	blkb 
| Harry Butterworth <harry@xxxxxxxxxxxxxxxxxxxxxxxxxxxxx>
wrote on 07/27/2006 01:06:50 PM:
 
 > On Thu, 2006-07-27 at 12:58 -0400, Reiner Sailer wrote:
 > >
 > >
 > > Harry Butterworth <harry@xxxxxxxxxxxxxxxxxxxxxxxxxxxxx>
wrote on
 > > 07/27/2006 12:36:43 PM:
 > >
 > > > On Thu, 2006-07-27 at 17:26 +0100, Harry Butterworth wrote:
 > > >
 > > > > untrusted driver domain <-> trusted encryption
domain <->
 > > FE-domain
 > > > >                
           hypervisor
 > > > >                
   trusted access control domain
 > > >
 > > > Another argument in favour of this kind of approach is that
if your
 > > BE
 > > > is something like a fibrechannel driver for a SAN, there
isn't
 > > actually
 > > > any security on the SAN side of it so any guarantees provided
by the
 > > > driver domain are pretty much worthless.
 > > >
 > > > Harry.
 > > >
 > >
 > > We are talking about scalable, secure, and efficient local device
 > > virtualization.
 >
 > Even with local devices there is no security on the device side of
the
 > device driver.  Consider the case of a locally attached sata
drive
 > containing 2 partitions, one for each of two domains.  It's not
unheard
 > of for disk drives to write the data in the wrong place.  Or
read and
 > return the wrong block.  Happens all the time.
 >
 
 If you can't trust your hardware, then you cant trust
a domain built on top of it. There is no need to convince me. If this is
not a "fixable" problem, then such devices cannot be assumed
trused.
 
 Either they are not shared or the risk must be mitigated
(e.g., as you suggested by encryption/signing and another trusted proxy).
 
 Is this undeterministic/uncontrollable behavior considered
"normal" operation?
 
 Thanks
 Reiner
 _______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
 | 
 
| <Prev in Thread] | Current Thread | [Next in Thread> |  | 
Re: [Xen-devel] [PATCH][ACM] kernel enforcement of vbd policies via	blkback driver, (continued)
Re: [Xen-devel] [PATCH][ACM] kernel enforcement of vbd policies via	blkback driver, Andrew Warfield
Re: [Xen-devel] [PATCH][ACM] kernel enforcement of vbd policies	via blkback driver, Harry Butterworth
Re: [Xen-devel] [PATCH][ACM] kernel enforcement of vbd policies	via	blkback driver, Reiner Sailer
Re: [Xen-devel] [PATCH][ACM] kernel enforcement of vbd	policies	via blkback driver, Harry Butterworth
Re: [Xen-devel] [PATCH][ACM] kernel enforcement of vbd	policies	via blkback driver, Harry Butterworth
Re: [Xen-devel] [PATCH][ACM] kernel enforcement of vbd	policies	via	blkback driver, Reiner Sailer
Re: [Xen-devel] [PATCH][ACM] kernel enforcement of	vbd	policies	via blkback driver, Harry Butterworth
Re: [Xen-devel] [PATCH][ACM] kernel enforcement of	vbd	policies	via blkback driver, Harry Butterworth
Re: [Xen-devel] [PATCH][ACM] kernel enforcement of	vbd	policies	via	blkback driver, Reiner Sailer
Re: [Xen-devel] [PATCH][ACM] kernel enforcement	of	vbd	policies	via blkback driver, Harry Butterworth
Re: [Xen-devel] [PATCH][ACM] kernel enforcement of	vbd	policies	via	blkback driver,
Reiner Sailer <=
Re: [Xen-devel] [PATCH][ACM] kernel enforcement	of	vbd	policies	via blkback driver, Harry Butterworth
 |  |  | 
  
    |  |  |