WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-users

[Xen-users] Xen binary distrib's kernel as domU kernel

To: xen-users@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-users] Xen binary distrib's kernel as domU kernel
From: Sipos Ferenc <frank@xxxxxxx>
Date: Wed, 10 Jan 2007 20:23:21 +0100
Delivery-date: Wed, 10 Jan 2007 11:23:23 -0800
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-users-request@lists.xensource.com?subject=help>
List-id: Xen user discussion <xen-users.lists.xensource.com>
List-post: <mailto:xen-users@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-users>, <mailto:xen-users-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-users>, <mailto:xen-users-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-users-bounces@xxxxxxxxxxxxxxxxxxx
Hi All,

just a quicky. Is it a security breach (by any means) if I run the
official XenSource e.g. vmlinuz-2.6-xen kernel as my domU kernel? I
mean, this has the 'Privilege domain' option compiled in (as the very
same one runs under the dom0 itself) as well as the {net,block}-backend
drivers?

I'm using it in a potentially malicious environment (VPS hosting) and I
want to make sure noone can tamper with system from a domU the way that
is not desirable.

Thanks for your time in advance,
Frank


_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users