[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] severe security issue on dom0/xend/xm/non-root users
On Sun, 6 Mar 2005, Tommi Virtanen wrote: > Rik van Riel wrote: > > Note that I do not believe that xend access should be root > > only, people may want to run management software under another > > UID. As long as domain 0 doesn't get any untrusted users, > > things should be fine. > > That's not good design. I sincerely think access to any confidential > or security conscious part of xen should be limited, e.g. with a > unix domain socket located in a directory only readable by a certain > group. Good point, then we could use filesystem permissions and/or selinux policy to restrict who gets access to xend. > Note that if there are harmless xm commands (xm list and so on), they > could be allowed for all users in dom0. This would require either access permission checks inside xend, or a separate socket for only unprivileged operations. -- "Debugging is twice as hard as writing the code in the first place. Therefore, if you write the code as cleverly as possible, you are, by definition, not smart enough to debug it." - Brian W. Kernighan ------------------------------------------------------- SF email is sponsored by - The IT Product Guide Read honest & candid reviews on hundreds of IT Products from real users. Discover which products truly live up to the hype. Start reading now. http://ads.osdn.com/?ad_id=6595&alloc_id=14396&op=click _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxxx https://lists.sourceforge.net/lists/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |