qemu for xen secure by default
play

QEMU for Xen secure by default Deprivileging the PC system emulator - PowerPoint PPT Presentation

QEMU for Xen secure by default Deprivileging the PC system emulator Ian Jackson <ian.jackson@eu.citrix.com> FOSDEM 2016 with assistance from Stefano Stabellini guest guest Xen PV driver IDE driver Xen PV protocol mmio, dma, etc.


  1. QEMU for Xen secure by default Deprivileging the PC system emulator Ian Jackson <ian.jackson@eu.citrix.com> FOSDEM 2016 with assistance from Stefano Stabellini

  2. guest guest Xen PV driver IDE driver Xen PV protocol mmio, dma, etc. qemu Emulated IDE controller Xen PV backend (usually), syscalls (usually) dom0 (usu.dom0) kernel Device driver kernel Device driver PV HVM

  3. ... ... ... ... ... http://xenbits.xen.org/xsa/ from Xen Security Team advisories page,

  4. Xen on x86 modes, and device model bug implications Current status for users of upstream Xen and distros and future plans Status Device model Notes bugs mean PV Fully supported Safe (no DM) Only modified guests HVM qemu in dom0 Fully supported Vulnerable Current default as root HVM qemu stub DM Upstream but not Safe Ancient qemu qemu-xen-trad. in most distros. Build system problems HVM qemu stub DM In progress Safe Rump build system rump kernel Hard work! is mini distro Targeting HVM qemu dom0 No privilege esc. Defence in depth Xen 4.7 not as root Maybe dom0 DoS Hopefully, will be default

  5. Xen on x86 modes, and device model bug implications Current status for users of upstream Xen and distros and future plans Status Device model Notes bugs mean PV Fully supported Safe (no DM) Only modified guests HVM qemu in dom0 Fully supported Vulnerable Current default as root HVM qemu stub DM Upstream but not Safe Ancient qemu qemu-xen-trad. in most distros. Build system problems HVM qemu stub DM In progress Safe Rump build system rump kernel Hard work! is mini distro Targeting HVM qemu dom0 No privilege esc. Defence in depth Xen 4.7 not as root Maybe dom0 DoS Hopefully, will be default

  6. qemu device model process guest dom0 kernel guest "dma" domain mmio handling net, storage control ioport handling etc. access interrupts underlying Xen disk, network, etc.

  7. Xen on x86 modes, and device model bug implications Current status for users of upstream Xen and distros and future plans Status Device model Notes bugs mean PV Fully supported Safe (no DM) Only modified guests HVM qemu in dom0 Fully supported Vulnerable Current default as root HVM qemu stub DM Upstream but not Safe Ancient qemu qemu-xen-trad. in most distros. Build system problems HVM qemu stub DM In progress Safe Rump build system rump kernel Hard work! is mini distro Targeting HVM qemu dom0 No privilege esc. Defence in depth Xen 4.7 not as root Maybe dom0 DoS Hopefully, will be default

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend