Jonathan Tripathy wrote:
>Can you please explain to me
some of these "side channel attacks"?
At some points, the guest and host
are communicating, not to mention
that for a lot of the time, the guest is
using the processor. If
there is a bug in Xen somewhere, then it's
conceivable that the guest
could exploit this in several ways.
One is
simply to subvert the communications between the guest and the
host - things
like buffer overflows, code injection, etc that could
be used to manipulate
the host into doing something that it's not
supposed to. If a guest can
somehow get control of the host then all
security is out of the windows since
the host has "super god" access
to everything on the machine.
If the
guest can somehow subvert the security settings in the
processor then it
could break out of it's virtual processor jail and
have access to the whole
machine. Once again, if that happens, then
all your security goes out of the
window.
Personally I don't think the risks are high, but these are
complex
systems running complex code. Even the "big boys" can get
things
wrong - remember the Pentium floating point bug that slipped
through
all Intel's testing ?
>I've never heard of "storage
reuse" before?
You have some storage used for task A. Task A is no longer
required
and you destroy it. You now have a need for Task B and allocate
it
some storage. Unless you fully wipe the space, then the
storage
allocated to Task B may contain data previously used by Task A.
This
isn't Xen specific, the same thing happens if you reuse any
storage
in any form without sanitising it first.
-
--
Simon
Hobson
-----------------------------------------------------------------------------------------------------------------------------------
Hi Simon,
Regarding storage "reuse", I'm guessing the best thing that I
can do is zero an LV (dd if=/dev/zero of=/dev/vg/lvx) before assigning it to a
public VM?
Regarding the other things, are there any unpatched known
exploits in Xen? I believe that the lady that made the "Blue Pill" found one,
but I think that was patched? Is there anything I can do? Or should I just
relax?
It's funny that when I was using VMWare ESXi, I (any many
others) were happy to mix internal and public VMs on the same machine, all
because it was backed by a big company. I'm guessing the same risks apply to Xen
as they do VMWare?