Re: Ceph on XenServer

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Massimiliano,

The fact that the core code happens to reside in the kernel has no bearing on the overall security posture. Developers either do a good job of isolating guest/host code, or they don't.

As I'm sure you know, xen has had a number of dom0 vm-escape vulnerabilities in the past year. Dom0/domU inherently offers no more security than the KVM model. It's all about implementation.

Chris


On February 26, 2017 6:34:48 AM Massimiliano Cuttini <max@xxxxxxxxxxxxx> wrote:

Hi Lindsay,

as far as I know, KVM stand for KERNEL VIRTUAL MACHINES.
When a VM is talking to KVM, in reality it's talking directly to kernel
hypervisor.
There is not any software layering that is running the virtualization
for you.
It's just the kernel.

This means: really high performance (no intermediates) but Kernel
exposed to upstream attacks.


Il 26/02/2017 06:04, Lindsay Mathieson ha scritto:
On 26/02/2017 12:12 AM, Massimiliano Cuttini wrote:
The pity is that is based o KVM, which is as far as I know is a ligth
hypervisor that is not able to isolate the virtual machine properly.
Due to this is possible to frozen the hypervisor kernel from a guest
virtual machine allowing somebody to freeze all your VMs all in once.

Ummmmm ... No. KVM/Qemu is fully virtualised.


_______________________________________________
ceph-users mailing list
ceph-users@xxxxxxxxxxxxxx
http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com


_______________________________________________
ceph-users mailing list
ceph-users@xxxxxxxxxxxxxx
http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com



[Index of Archives]     [Information on CEPH]     [Linux Filesystem Development]     [Ceph Development]     [Ceph Large]     [Ceph Dev]     [Linux USB Development]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]     [xfs]


  Powered by Linux