Can Erkin Acar wrote:
> L. V. Lammert wrote:
>> At 05:12 PM 10/24/2007 +0200, Henning Brauer wrote:
>>> * L. V. Lammert <[EMAIL PROTECTED]> [2007-10-24 16:46]:
>>>> Virtualization provides near absolute security - DOM0 is not visible to
>>>> the user at all, only passing network traffic and handling kernel calls.
>>>> The security comes about in that each DOMU is totally isolated from the
>>>> the others, while the core DOM0 is isolated from any attacks.
>>> dream on.
>>> that is what marketing wants to tell you.
>>> in fact the isolation is incredibly poor.
>> Sorry, the kernel hacking world is pretty far removed from 'enterprise 
>> reality' <not that it's a bad thing - I often wish it were that simple>!! 
>> In reality, there are tons of SMEs out there using MS Crap and other risky 
>> software! The few security risks you cite for XEN are negligable by 
>> comparison.
> 
> When all this crap/risky software is running on separate boxes, you only
> have
> the network as an attack path to the other crap. This path is well
> understood,
> and there are established policies, best practices, tools that you can
> use to
> control and monitor your network.

Contrariwise, there is *some* security benefit to running all the
services virtualized, compared to running all the services on the same
machine but *not* virtualized.  In that case, though, you're not getting
any improved resource utilization, and you're going with a very
complicated and unaudited system (with arbitrary code execution bugs
coming to light *this month*) to achieve "improved security."

You can achieve a lot of the  promises of virtualized servers (with
fewer moving parts, and more code audits) using chroot and login classes
to run many services on a single big machine.
-- 
 Matthew Weigel
 hacker
 [EMAIL PROTECTED]

Reply via email to