Daniel,

On 8/1/07, Daniel P. Berrange <[EMAIL PROTECTED]> wrote:

> Unless you whitelist which monitor commands it can run this would be a
> significant security hole.  eg a guest could run
>
>   'usb_add disk /some/path'
>
> To get access to arbitrary files & disks from the host.
>

If we assume that kvm runs under root, yes (and if kvm finds out it
runs under root, it might disable such access to monitor). I have
written a suid wrapper (very simple) that does whatever necessary
under root, and then drops to user privileges, then execs kvm, so
these actions will be limited by Linux multi-user mechanisms as usual.
In my daily practice, I run kvm under my user privileges, and it works
fine.

See the kvmadm project (link on the kvm wiki page "Management tools").

-- 
Dimitry Golubovsky

Anywhere on the Web

-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems?  Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >>  http://get.splunk.com/
_______________________________________________
kvm-devel mailing list
kvm-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/kvm-devel

Reply via email to