[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: [Xen-devel] Regarding Xen security....



 

> -----Original Message-----
> From: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx 
> [mailto:xen-devel-bounces@xxxxxxxxxxxxxxxxxxx] On Behalf Of 
> Praveen Kushwaha
> Sent: 12 January 2007 10:13
> To: xen-devel@xxxxxxxxxxxxxxxxxxx
> Subject: [Xen-devel] Regarding Xen security....
> 
> Hi Sir,
> 
>              I have a question regarding the security of Xen. 
> What are the security threats in with Intel VT-x.

Suppose we (as a community) did know of any "exploits" in the Intel or
AMD virtualization technologies, would it make sense to distribute it to
everyone?

As far as I'm aware (and, although I work for AMD, I can't say I know
EVERYTHING, so there may be things that I'm not aware of), AMD SVM or
Intel VT-x doesn't add anything that increases security threats - in
fact they both add a level of extra security, as you can prevent the
software in the OS from actually touching hardware that you don't
explicitly give to the guest. 

Of course, broken kernel or other software will still potentially allow
a user to gain access to the guest-domain - Xen doesn't really fix
kernel security in general (it may "accidentally", but it's not there
for that purpose). Obviously, for any virtualized environment, the
security of the "host domain" (Dom0 in Xen) is critical to ensure that
the other domains remain secure - so firewalling or otherwise preventing
"outside access" to Dom0 is key to ensuring that the guest domains are
secure - but that's got nothing to do with any of the Virtualization
Technology features in the processor. 

For further improved security, both AMD and Intel have features that are
either already in the processor (AMD SVM) or planned for near-time
release (Intel's LaGrande/Trusted eXecution Technology/TXT), which allow
the execution environment to be checked before it's loaded, to ensure
that the host domain and it's relevant components are indeed what the
system owner/user expects them to be - and once that's secure, you can
then verify (or measure as it's called in security circles) the kernel
loaded as DomU. 

--
Mats
> 
>  
> 
>  
> 
> Thanks,
> 
> Praveen Kushwaha                                              
>                                                               
>                                                
> ______________________________________________________________
> _______________________________
> 
> NEC HCL System Technologies Ltd., 4th Floor, Tower B, Logix 
> Techno  Park, Noida | Tel: 120 436 6777 Extn 748
> 
>  
> 
>  
> 
>  
> 
> 



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.