WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-users

Re: [Xen-users] VM isolation

To: xen-users@xxxxxxxxxxxxxxxxxxx
Subject: Re: [Xen-users] VM isolation
From: Mark Williamson <mark.williamson@xxxxxxxxxxxx>
Date: Fri, 31 Aug 2007 03:45:23 +0100
Cc: Andrew Jennings <ajennings@xxxxxxxxxx>
Delivery-date: Thu, 30 Aug 2007 19:45:49 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
In-reply-to: <1187955814.3967.7.camel@xxxxxxxxxxxxxxxxxxxxx>
List-help: <mailto:xen-users-request@lists.xensource.com?subject=help>
List-id: Xen user discussion <xen-users.lists.xensource.com>
List-post: <mailto:xen-users@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-users>, <mailto:xen-users-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-users>, <mailto:xen-users-request@lists.xensource.com?subject=unsubscribe>
References: <1187955814.3967.7.camel@xxxxxxxxxxxxxxxxxxxxx>
Sender: xen-users-bounces@xxxxxxxxxxxxxxxxxxx
User-agent: KMail/1.9.6
> Could someone please point me to a document that describes how the host
> protects isolates the virtual machine to prevent accessing information
> on other hosts. For example, preventing Domain 1 from looking at Domain
> 2's memory space, hardware I/O, or network traffic (i.e. promiscuous
> mode).

For PV guests, memory space is protected by the means of Xen validating each 
pagetable update that's made by a guest.  This prevents a guest from ever 
generating a mapping that points to another guest.

For HVM guests, the pagetables are "shadowed" in order to virtualise the 
physical address space; this means that there's actually no means for a guest 
to specify a mapping of another guest's memory.

Grant tables are used to share memory in a secure, capability-based way.

IO is done through virtual interfaces, which are conventionally set up to 
enforce isolation.

If you assign a physical PCI device to a guest then you throw away memory 
isolation.  A guest with physical PCI access could (in the face of a 
sufficiently motivated attacker) own the whole host.  So don't do that if 
it's security critical :-)

Network traffic I'm not quite familiar with enough to evaluate in detail.

> Essentially, I want to be able to rate the isolation between wide 
> open, and logically separate hardware.

Hope that helps some.

There are some descriptions of the workings here: 
http://www.cl.cam.ac.uk/research/srg/netos/xen/architecture.html which may 
illuminate too.

Cheers,
Mark

-- 
Dave: Just a question. What use is a unicyle with no seat?  And no pedals!
Mark: To answer a question with a question: What use is a skateboard?
Dave: Skateboards have wheels.
Mark: My wheel has a wheel!

_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users

<Prev in Thread] Current Thread [Next in Thread>