Re: TPM

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On onsdag 29 augusti 2018 kl. 20:19:22 EEST Alvin Starr wrote:

> So in this case do the VM's need to be protected from each other or are
> they all inside a safe controlled network.

No, the environment is quite controlled.
What need to be achieved is that IF someone steal the image
for one or several of the VM:s they will not be able to
emulate the functionality on any other hardware platform.

The VM:s are together making up a functional
setup where they are all needed. Isolation between them is
not critical.

> Is this to secure one VM from another or is it being used for something
> like software licensing validation?
> 
> One has serious security implications the other is just making it
> possible for someone to run a stupid licensing model on a virtual machine.

No licensing :-)

Best
Dag



_______________________________________________
CentOS-virt mailing list
CentOS-virt@xxxxxxxxxx
https://lists.centos.org/mailman/listinfo/centos-virt



[Index of Archives]     [CentOS Users]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [X.org]     [Xfree86]     [Linux USB]

  Powered by Linux