WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-users

Re: [Xen-users] Re: Live Migration Config

Nigel Head wrote:


On 10/31/05, *Anthony Liguori* <aliguori@xxxxxxxxxx <mailto:aliguori@xxxxxxxxxx>> wrote:

    [...]  To enable migration from specific
    addresses, you would then say:

      iptables -I INPUT -p tcp --source 192.168.1.100
    <http://192.168.1.100> --destination-port
    8002 -j ACCEPT


Or from anyone claiming to have ip address 192.168.1.100 <http://192.168.1.100> ...

Yeah, IP based filtering is only going to help you if

1) you're on a trusted subnet
2) you trust that the router between your subnet and the rest of the world is going to prevent spoofing to your subnet

Without IP based filtering, you're additionally assuming:

3) the subnet is not accessible to the outside world

This means you have to have your dom0's configured to be on a physically isolated network.

Having a truly secure migration session means that you could do migrations over an untrusted subnet. This is going to have a performance impact though. This scenario also is not going to work out of the box in 3.0.

You can get that though with an SSH tunnel. It should Just Work too. It would be interesting to know the performance impact of migrating over an SSH tunnel.

Regards,

Anthony Liguori

I'm quite sure that the best (for my definition of 'best' of course) way to do this is not via firewalling, because of the above spoofing possibilities, but also not by complicating the xen tools themselves. I'd like to come back again to the 'VPN' type solution discussion.

I know that a full VPN setup is sufficiently complex that I've always been scared away from trying, but I have the feeling that it wouldn't be too terribly difficult to setup some wrapper type functionality so that ssh could be used to build a 'tunnel' to the target machine and connections to the target xfrd could then be made from, and limited to, 127.0.0.1 <http://127.0.0.1> on the target machine. While I haven't plunged through the xfrd code to see how a tunnel create/destroy script could be built in I don't imagine it would be too terrible. There is a lot of precedent for using ssh this way ('rsync -e ssh' etc), it is as secure as you are likely to want, and it's easier than trying to add credential support directly into the tools themselves, as well as being more in the *nix spirit of combining what you already have.

For small setups, this could be done statically using port forwarding (with something like Vtun, if you prefer virtual devices) ... the dynamic variant would only be needed where there are too many systems to build static interconnects from everywhere to everywhere else.

In security terms, if ssh is compromised on any of my systems they're dead in the water anyway, so using ssh for this wouldn't seem to add any risk that I haven't already accepted.

I'm going to try this out as soon as my day job leaves me enough time ... which won't be for a while I'm afraid.



Now, as this is surely not fresh news to most of you, what is wrong with my definition of 'best' ??


--
N.

------------------------------------------------------------------------

_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users



_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users