[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] domU to dom0 security


  • To: xen-devel@xxxxxxxxxxxxxxxxxxxxx
  • From: Brian Hays <brian.hays@xxxxxxxxx>
  • Date: Thu, 24 Mar 2005 08:52:41 -0500
  • Delivery-date: Thu, 24 Mar 2005 13:53:54 +0000
  • Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:message-id:date:from:reply-to:to:subject:mime-version:content-type:content-transfer-encoding; b=KG+0dRa0vTM2K0C8Zdl7yrZc5IukAobuCgUueAlnxxCmoovk8F9CDI+BafomVDp/qlmDsLReZUpZeaBRjEfzveXOkQVtDIt13vp/Be3npGyO2npxseRXT/C//Ecphjw1EizJtf5HQnUlyOVQJ3TVitewOG3wTTjC2VTF7+BUdJc=
  • List-id: List for Xen developers <xen-devel.lists.sourceforge.net>

Hello,

I am considering using XEN to host "virtual dedicated servers" for a
few of my clients. Are there any security issues that would allow domU
(guestOS) admins access to dom0 or global xend commands by default? If
so, is there anything I can do to lock it down so that only dom0 users
(root) would have access to dom0 and the xend commands?

Thanks,
Brian


-------------------------------------------------------
This SF.net email is sponsored by Microsoft Mobile & Embedded DevCon 2005
Attend MEDC 2005 May 9-12 in Vegas. Learn more about the latest Windows
Embedded(r) & Windows Mobile(tm) platforms, applications & content.  Register
by 3/29 & save $300 http://ads.osdn.com/?ad_id=6883&alloc_id=15149&op=click
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxxx
https://lists.sourceforge.net/lists/listinfo/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.