QEMU for Xen secure by default Deprivileging the PC system emulator - - PowerPoint PPT Presentation

qemu for xen secure by default
SMART_READER_LITE
LIVE PREVIEW

QEMU for Xen secure by default Deprivileging the PC system emulator - - PowerPoint PPT Presentation

QEMU for Xen secure by default Deprivileging the PC system emulator Ian Jackson <ian.jackson@eu.citrix.com> FOSDEM 2016 with assistance from Stefano Stabellini guest guest Xen PV driver IDE driver Xen PV protocol mmio, dma, etc.


slide-1
SLIDE 1

Ian Jackson <ian.jackson@eu.citrix.com> Deprivileging the PC system emulator

QEMU for Xen secure by default

FOSDEM 2016 with assistance from Stefano Stabellini

slide-2
SLIDE 2

guest kernel Device driver Xen PV driver Xen PV protocol

HVM PV

qemu guest kernel mmio, dma, etc. Device driver Emulated IDE controller IDE driver (usually), syscalls (usually) dom0 Xen PV backend (usu.dom0)

slide-3
SLIDE 3

... ... ... ... ...

from Xen Security Team advisories page, http://xenbits.xen.org/xsa/

slide-4
SLIDE 4

Xen on x86 modes, and device model bug implications Current status for users of upstream Xen and distros and future plans Status Device model bugs mean Notes PV Fully supported Safe (no DM) Only modified guests HVM qemu in dom0 as root Fully supported Vulnerable Current default HVM qemu stub DM qemu-xen-trad. Upstream but not in most distros. Safe Ancient qemu Build system problems HVM qemu stub DM rump kernel In progress Hard work! Safe Rump build system is mini distro HVM qemu dom0 not as root Targeting Xen 4.7 No privilege esc. Maybe dom0 DoS Defence in depth Hopefully, will be default

slide-5
SLIDE 5

Xen on x86 modes, and device model bug implications Current status for users of upstream Xen and distros and future plans Status Device model bugs mean Notes PV Fully supported Safe (no DM) Only modified guests HVM qemu in dom0 as root Fully supported Vulnerable Current default HVM qemu stub DM qemu-xen-trad. Upstream but not in most distros. Safe Ancient qemu Build system problems HVM qemu stub DM rump kernel In progress Hard work! Safe Rump build system is mini distro HVM qemu dom0 not as root Targeting Xen 4.7 No privilege esc. Maybe dom0 DoS Defence in depth Hopefully, will be default

slide-6
SLIDE 6

dom0 kernel guest underlying disk, network, etc. Xen "dma" mmio handling ioport handling interrupts domain control guest

  • etc. access

net, storage qemu device model process

slide-7
SLIDE 7

Xen on x86 modes, and device model bug implications Current status for users of upstream Xen and distros and future plans Status Device model bugs mean Notes PV Fully supported Safe (no DM) Only modified guests HVM qemu in dom0 as root Fully supported Vulnerable Current default HVM qemu stub DM qemu-xen-trad. Upstream but not in most distros. Safe Ancient qemu Build system problems HVM qemu stub DM rump kernel In progress Hard work! Safe Rump build system is mini distro HVM qemu dom0 not as root Targeting Xen 4.7 No privilege esc. Maybe dom0 DoS Defence in depth Hopefully, will be default