|   | 
      | 
  
  
      | 
      | 
  
 
     | 
    | 
  
  
     | 
    | 
  
  
    |   | 
      | 
  
  
    | 
         
xense-devel
Re: [Xense-devel] questions about isolation model and GVTPM
 
 xense-devel-bounces@xxxxxxxxxxxxxxxxxxx wrote on 04/25/2006
10:40:38 AM: 
 
> Hi guys, 
 Hi Huang,
 
 I am still out-of-the office but I am starting to
read my e-mail :-) I did not see anybody answering to your e-mail yet,
so I will try to answer those parts that I am familiar with.
 
 > I am interesting in vitrualization and tcpa.I
want to do some  
> research on Xen platform to present a more trusted VMM. I think the
 
> key points are isolation and integrity. 
 >
 > With isoliation, I want to use uninterference
policy to confine the  
> communication between xen and domains with device channel.
 
 This sounds interesting. Can you describe this policy
a little more? What does it address that the current Type Enforcement (controlled
sharing between Domains) or the Chinese Wall Policy do not express? Do
you aim at discovering/measuring covert channels (a very beneficial, interesting,
and challenging task)?
 
 >That is to 
> say, map the formal model to xen. I think now the MAC mechanism also 
> does some isolation, the channel-control analyse with formal model
 
> is another way, especially used for confine the TCB where access  
> control can do nothing.
 
 You must be talking about covert channels here since
those are not access controlled.
 
 >By the way,I think critical application also  
> is a part of TCB. 
 > And from Reiner, I see Xen is not a isolation
VMM,or separation VMM. 
> But I think formal analyze can benefit confinement of Xen's I/O device.
 
 Can you give an example of an I/O device and the confinement
guarantees you are looking for? We are extending the MAC into I/O virtualization
(which happens on operating system level).
  
 > With integrity, I want to examine the GVTPM architecture
and do  
> something based on it. 
 > My questions are: does the isolation provided
by Xen for domains is  
> strong enough from your developer's view? Is the! re anybody can  
> help me to learn more about GVTPM except for a .ppt document? 
 
 I can give a little information about last 4 letters
(VTPM): there are multiple documented approaches. The current implementation
in Xen is the result of a cooperation between Intel and IBM. We have a
project web page at IBM Research that describes our general approach (http://www.research.ibm.com/ssd_vtpm)
and we will present a research paper on the Usenix Security Symposium this
year describing challenges and solutions when virtualizing a TPM.
 
 Probably a person from Intel can describe best their
vision of generalized VTPM or point to more information :-)
 
 Regards
 Reiner
  
> Something like what the function of "shared memory TPM driver"
in  
> the code? is it a backend driver? Or what is the opinion of TCG about
GVTPM?
 > I am already much inspired by your help in the
mail list.Hope I can  
> do something to the community. Thanks! 
 > Yours Huang _______________________________________________ 
> Xense-devel mailing list 
> Xense-devel@xxxxxxxxxxxxxxxxxxx 
> http://lists.xensource.com/xense-devel 
_______________________________________________
Xense-devel mailing list
Xense-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xense-devel
 
 |   
 
 | 
    | 
  
  
    |   | 
    |