WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-users

Re: [Xen-users] xen in hosting envoroment

To: Azrul Rahim <write2me@xxxxxxxxx>
Subject: Re: [Xen-users] xen in hosting envoroment
From: Nico Kadel-Garcia <nkadel@xxxxxxxxx>
Date: Sun, 03 Feb 2008 10:09:08 +0000
Cc: xen-users@xxxxxxxxxxxxxxxxxxx
Delivery-date: Sun, 03 Feb 2008 02:05:32 -0800
Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from:user-agent:mime-version:to:cc:subject:references:in-reply-to:content-type:content-transfer-encoding; bh=OSX6mb8aiGiTzWrIGLa9+Gi9S8iJrYw085lxKbIQDGk=; b=RM5w9qZMEfhKY3tAdRKpBBnzH04gWURLh2eX/c5Fow1BYo9dDcAq7PLDw+E29vTVjAzhobKSbq2PkvL8dvegn2D39ecvngMpVA4iCmMYFAeHiIk08p0hExUXHPR2ZNd3aldSWUNFjyPqz31t8mMirwtXhaIrJmCVeX5oJMAQvNU=
Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:user-agent:mime-version:to:cc:subject:references:in-reply-to:content-type:content-transfer-encoding; b=ggDnDsKU9wOGPxTjF5UKg/PMwBiZ61i8cySmm8DrQsNMfrr2mICoVow6Tm0jolc0F/D06sBKBVrWgAqYJtkdTyj3xIWZxtH64/mxmh593Me9loZyecQDUGDwIJjcZdBzy858uIgypQE5DhP2pdkKqucOXK110p4erAmWaBmJr20=
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
In-reply-to: <5c7a514e0802030141m334e2e4g6a00dc35862184a3@xxxxxxxxxxxxxx>
List-help: <mailto:xen-users-request@lists.xensource.com?subject=help>
List-id: Xen user discussion <xen-users.lists.xensource.com>
List-post: <mailto:xen-users@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-users>, <mailto:xen-users-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-users>, <mailto:xen-users-request@lists.xensource.com?subject=unsubscribe>
References: <5c7a514e0802030141m334e2e4g6a00dc35862184a3@xxxxxxxxxxxxxx>
Sender: xen-users-bounces@xxxxxxxxxxxxxxxxxxx
User-agent: Thunderbird 2.0.0.9 (Windows/20071031)
Azrul Rahim wrote:
Hi,

I am planning to offer a hosted xen server within my locality. My
question is, is there any security issue that I should be aware of. I
am currently letting user to choose which kernel they want to boot.

Is there any possibility, that with, say a recompiled kernel or kernel
module, a user can actually gain access to the Dom0?

Thank you

Azrul Rahim
That would be a *SERIOUS* bug, and if anyone knew of such, we'd be reporting it pretty fast. There was a fascinating RHEL bug reported, in the use of pygrub, because pygrub would read the grub contents from the DomU at boot time and this created an interesting security risk for the pygrub program itself.

A much bigger risk is the standard co-location risk of "these machines I don't control are inside my network: how do I protect myself from them?".

_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users

<Prev in Thread] Current Thread [Next in Thread>