WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-users

RE: [Xen-users] Exploiting XEN

To: "Daniel P. Berrange" <berrange@xxxxxxxxxx>
Subject: RE: [Xen-users] Exploiting XEN
From: "Petersson, Mats" <Mats.Petersson@xxxxxxx>
Date: Tue, 13 Mar 2007 16:53:54 +0100
Cc: Artur Baruchi <mail.baruchi@xxxxxxxxx>, Xen-users@xxxxxxxxxxxxxxxxxxx
Delivery-date: Tue, 13 Mar 2007 08:53:25 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
In-reply-to: <20070313154326.GB24377@xxxxxxxxxx>
List-help: <mailto:xen-users-request@lists.xensource.com?subject=help>
List-id: Xen user discussion <xen-users.lists.xensource.com>
List-post: <mailto:xen-users@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-users>, <mailto:xen-users-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-users>, <mailto:xen-users-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-users-bounces@xxxxxxxxxxxxxxxxxxx
Thread-index: AcdlhmjdcBYWHXqCQ1SqKDj0yynQDgAAECog
Thread-topic: [Xen-users] Exploiting XEN
 

> -----Original Message-----
> From: Daniel P. Berrange [mailto:berrange@xxxxxxxxxx] 
> Sent: 13 March 2007 15:43
> To: Petersson, Mats
> Cc: Artur Baruchi; Xen-users@xxxxxxxxxxxxxxxxxxx
> Subject: Re: [Xen-users] Exploiting XEN
> 
> On Tue, Mar 13, 2007 at 04:30:53PM +0100, Petersson, Mats wrote:
> > > -----Original Message-----
> > > From: xen-users-bounces@xxxxxxxxxxxxxxxxxxx 
> > > [mailto:xen-users-bounces@xxxxxxxxxxxxxxxxxxx] On Behalf Of 
> > > Artur Baruchi
> > > Sent: 13 March 2007 14:43
> > > To: Xen-users@xxxxxxxxxxxxxxxxxxx
> > > Subject: [Xen-users] Exploiting XEN
> > > 
> > > Hi guys,
> > > 
> > > Im making somes researchs about security in Virtual 
> Machines, and does
> > > anybody knows, if exists a exploit or a rootkit for Xen? 
> I would like
> > > to test it (if exist).
> > 
> > Please take this the right way... If we assume one does 
> exist, would you
> > send it to me, if I asked you? [particularly if my e-mail 
> address was of
> > an "anonymous" origin like gmail?] - how do I know that the 
> purpose you
> > are asking for is the purpose you are REALLY asking for, 
> rather than for
> > example that you know someone's machine is Xen-based and you want to
> > break into it. This is a non-moderated mailing-list, anyone with an
> > e-mail account anywhere in the world (more or less) can sign up. 
> > 
> > I personally am not aware of any "rootkit" that relates to Xen. 
> 
> And more to the point, if any of the Xen developers did know 
> of a "rootkit"
> you can be damn sure they'd be fixing whatever flaw made it 
> possible, rather
> than passing it around for people to try out. 

Agree completely. [Although I guess some people on the Xen User's list
may not be developers, I believe anyone here would rather forward such a
"rootkit" to the developers so that they can fix the underlaying flaw,
rather than passing it around to try out amongst "friends"].
> 
> > The Xen hypervisor is fairly small, and thus relatively easy to
> > understand and control against vulnerabilities. Since it's living
> > "outside" the host-OS that it controls, it's potentially 
> less vulnerable
> > than those hypervisors that live within the host-OS. 
> 
> Nice in theory, but in practice you have to include Dom0 as (at this
> time) it has effectively unrestricted access to the hardware and is
> neccessarily trusted by every DomU that cards about disk or network 
> I/O. While in theory Xen may allow a tighter security model, in the
> real-world deployments of Xen there's no better security from its 
> arch of hypervisor outside the Dom0 OS, vs other virt systems which
> have the hypervisor as part of  the Dom0.

I guess that's a fair comment too. Dom0 is a large part of a Xen
environment, and if Dom0 is compromised, then Xen can't really do that
much to prevent the system from being crashed, subverted or other
malicious acts. But I believe Xen itself is "safe" from Dom0 being
compromised - but it's moot point, as Xen on it's own is about as useful
as a chocalte teapot. 

But Xen isn't really the "culprit" in this scenario - it's the same
scenario for Linux (or whatever other OS we care to choose) without a
hypervisor.

--
Mats
> 
> Dan.
> -- 
> |=- Red Hat, Engineering, Emerging Technologies, Boston.  +1 
> 978 392 2496 -=|
> |=-           Perl modules: http://search.cpan.org/~danberr/  
>             -=|
> |=-               Projects: http://freshmeat.net/~danielpb/   
>             -=|
> |=-  GnuPG: 7D3B9505   F3C9 553F A1DA 4AC2 5648 23C1 B3DF 
> F742 7D3B 9505  -=| 
> 
> 
> 



_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users

<Prev in Thread] Current Thread [Next in Thread>