WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-users

[Xen-users] xen in hosting envoroment

To: xen-users@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-users] xen in hosting envoroment
From: "Azrul Rahim" <write2me@xxxxxxxxx>
Date: Sun, 3 Feb 2008 17:41:35 +0800
Delivery-date: Sun, 03 Feb 2008 01:42:12 -0800
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-users-request@lists.xensource.com?subject=help>
List-id: Xen user discussion <xen-users.lists.xensource.com>
List-post: <mailto:xen-users@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-users>, <mailto:xen-users-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-users>, <mailto:xen-users-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-users-bounces@xxxxxxxxxxxxxxxxxxx
Hi,

I am planning to offer a hosted xen server within my locality. My
question is, is there any security issue that I should be aware of. I
am currently letting user to choose which kernel they want to boot.

Is there any possibility, that with, say a recompiled kernel or kernel
module, a user can actually gain access to the Dom0?

Thank you

Azrul Rahim

_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users

<Prev in Thread] Current Thread [Next in Thread>