[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] Xen Security


  • To: xen-devel@xxxxxxxxxxxxxxxxxxxxx
  • From: Phillip Mumford <phillip.mumford@xxxxxxxxx>
  • Date: Wed, 19 Jan 2005 14:39:06 +0000
  • Delivery-date: Thu, 20 Jan 2005 08:46:02 +0000
  • Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:message-id:date:from:reply-to:to:subject:mime-version:content-type:content-transfer-encoding; b=mYr634cYN0P0jtMuiBFqvpG14r74ewgZ23T8u82a9iuB3wv/I8yJhwO3o9sLWyZXiBTwhKZu0ihdDnYHrLNr2y0ihNhJmyBjePKASpupMfLN+Ogpcm6t9g8RIS9CB06QjHdsdG5sbdV6wue0bipt2skwotchQXFivTv9lVtAzNc=
  • List-id: List for Xen developers <xen-devel.lists.sourceforge.net>

Just a quick question regarding the security of a Xen host.

Are there any security implications I need to be aware of if I allow a
Xen-U host to use kernel modules?  I've mainly used UML in past, where
a user could easily read files on the host machines filesystem.

Is it safe to allow people to run with modules allowed?


-------------------------------------------------------
This SF.Net email is sponsored by: IntelliVIEW -- Interactive Reporting
Tool for open source databases. Create drag-&-drop reports. Save time
by over 75%! Publish reports on the web. Export to DOC, XLS, RTF, etc.
Download a FREE copy at http://www.intelliview.com/go/osdn_nl
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxxx
https://lists.sourceforge.net/lists/listinfo/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.