[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] severe security issue on dom0/xend/xm/non-root users
Rik van Riel wrote: Note that I do not believe that xend access should be root only, people may want to run management software under another UID. As long as domain 0 doesn't get any untrusted users, things should be fine. That's not good design. I sincerely think access to any confidential or security conscious part of xen should be limited, e.g. with a unix domain socket located in a directory only readable by a certain group. If any user in dom0 can do sensitive xm operations, a security bug in _any_ dom0 networked app allows the attacker to gain remote root. That is, (xen trusts every user in dom0) implies (in dom0, all security vulnerabilities give access to root). Note that if there are harmless xm commands (xm list and so on), they could be allowed for all users in dom0. ------------------------------------------------------- SF email is sponsored by - The IT Product Guide Read honest & candid reviews on hundreds of IT Products from real users. Discover which products truly live up to the hype. Start reading now. http://ads.osdn.com/?ad_id=6595&alloc_id=14396&op=click _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxxx https://lists.sourceforge.net/lists/listinfo/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |