[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] Re: What is more secure? HVM or PV ?
On 12/19/06, Petersson, Mats <Mats.Petersson@xxxxxxx> wrote: What's the goal of the attack - to take control of the system or to just be a nuisance and crash it? The goal is to gain control over domain0, as the root user. To take control, I suspect the easiest approach is known kernel holes and a direct attack on Dom0. DomU is probably capable of causing Dom0 to crash - at least there's been bugs like that in the HVM side of the hypervisor - most of the PV side is probably more immunce thanks to greater maturity of the code. Are there any attack vectors that aren't directly related to Xen if dealing with PV, such as kernel facilities + processor architecture or stuff like that? If we'll look at it from a lines of code POV, then I guess that HVMs are less secure (vmexit handler / parsers / qemu), that code is not mature either. So, Is there any obvious conclusion about this topic? Or we can say that the security is the same in PV as in HVM? David. _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |