| 
         
xen-users
RE: [Xen-users] Xen Security
 
As of now, is 3.4.3 free of known exploits? I understand what you 
are saying about 3.0.3 and 3.2.x as they have a couple of bad exploits... 
  
Cheers  
 
  
From: Vern Burke 
[mailto:vburke@xxxxxxxx] Sent: Fri 16/07/2010 14:15 To: 
Jonathan Tripathy Cc: Xen-users@xxxxxxxxxxxxxxxxxxx Subject: 
Re: [Xen-users] Xen Security
  
I'd keep it up to snuff, yes. I myself test ran each XCP 
release candidate and the upgraded to the final 0.5.0 release within 24 hours 
of each becoming available.
  I really shudder to see people 
recommending running old 3.0.3 and 3.2.x releases because that's what happens 
to get thrown in with the particular Linux distribution. I think it's bad 
news.
  Vern Burke
  SwiftWater Telecom http://www.swiftwatertel.com Xen 
Cloud Control System http://www.xencloudcontrol.com
  On 
7/16/2010 7:59 AM, Jonathan Tripathy wrote: > Thanks Vern, > I can 
indeed keep my VMs up to date, however the customers will be in > charge 
of their VMs so I can't upgrade theirs, however I think this is a > moot 
point as they will have root access anyway. > I should probably upgrade my 
Xen 3.4.2 to 3.4.3 then? > Thanks > > 
------------------------------------------------------------------------ > 
*From:* Vern Burke [mailto:vburke@xxxxxxxx] > *Sent:* Fri 
16/07/2010 12:25 > *To:* Jonathan Tripathy; 
xen-users-bounces@xxxxxxxxxxxxxxxxxxx; > 
Xen-users@xxxxxxxxxxxxxxxxxxx > *Subject:* Re: [Xen-users] Xen 
Security > > I did NOT say that. Like much of the current discussion 
about cloud > security, it comes down to degree of likely. You are FAR 
more likely to > have a VM hacked directly as the result of lousy system 
admin practices > than you are some remote theoretical possibility of 
someone breaching > the hypervisor. > > In my opinion, unless 
you're storing nuclear launch codes, keep the > cloud/hypervisor up to 
date, keep the guest OS up to date, and follow > system admin best 
practices and the chances of being hacked are > vanishingly 
small. > > Vern > > Vern Burke, SwiftWater Telecom, http://www.swiftwatertel.com > > 
-----Original Message----- > From: Jonathan Tripathy 
<jonnyt@xxxxxxxxxxx> > Sender: 
xen-users-bounces@xxxxxxxxxxxxxxxxxxx > Date: Fri, 16 Jul 2010 
08:05:43 > To: Vern Burke<vburke@xxxxxxxx>; 
<Xen-users@xxxxxxxxxxxxxxxxxxx> > Subject: Re: [Xen-users] Xen 
Security > > Hi Vern, > > So you think I should just set 
up my networking properly and forget > about the rest? Do you feel it ok 
to share the same Xen host with > internal VMs with public 
VMs? > > Thanks > > > On 16/07/10 02:10, Vern 
Burke wrote: >  > I have no idea how you could actually PROVE that 
there's no possible >  > way someone could break out of a dom U 
into the dom 0. As I've written >  > before, since Xen is out and 
about in such a large way (being the >  > underpinning of Amazon 
EC2) that if there was a major risk of this, >  > we'd have seen 
it happen already. >  > >  > Vern 
Burke >  > >  > SwiftWater Telecom >  
> http://www.swiftwatertel.com >  
> ISP/CLEC Engineering Services >  > Data Center 
Services >  > Remote Backup Services >  
> >  > On 7/15/2010 7:07 PM, Jonathan Tripathy 
wrote: >  >> >  >> On 15/07/10 23:49, Jonathan 
Tripathy wrote: >  >>> Hi Everyone, >  
>>> >  >>> My Xen host currently run DomUs which 
contain some very sensitive >  >>> information, used by our 
company. I wish to use the same server to >  >>> host some 
VMs for some customers. If we assume that networking is set >  
>>> up securely, are there any other risks that I should worry 
about? >  >>> >  >>> Is Xen secure 
regarding "breaking out" of the VM? >  >>> >  
>>> Thanks >  >>> >  >>> 
_______________________________________________ >  >>> 
Xen-users mailing list >  >>> 
Xen-users@xxxxxxxxxxxxxxxxxxx >  >>> http://lists.xensource.com/xen-users >  
>> >  >> I'm running Xen 3.4.2 on CentOS 5.5 Dom0 by the 
way. >  >> >  >> 
_______________________________________________ >  >> Xen-users 
mailing list >  >> Xen-users@xxxxxxxxxxxxxxxxxxx >  
>> http://lists.xensource.com/xen-users >  
>> > > _______________________________________________ > 
Xen-users mailing list > Xen-users@xxxxxxxxxxxxxxxxxxx > http://lists.xensource.com/xen-users > > > > 
_______________________________________________ > Xen-users mailing 
list > Xen-users@xxxxxxxxxxxxxxxxxxx > http://lists.xensource.com/xen-users
   
_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users 
 |   
 
 | 
    |