L. V. Lammert <[EMAIL PROTECTED]> wrote:
>> > If not, then security issues compound due to multiple guest OSs and 
>> each set
>> > of inherent vulnerabilities.
>>
>>security issues and protections do not add up like numbers.
> 
> Sure they do. If I'm running Windoze as a guest OS, there are hundreds or 
> thousands of possible vulnerabilities. If I'm runng OBSD as a guest OS, 
> guess what (I hope you don't have to??) - few to none. There is no way to 
> 'compound threat [interaction]', but that doesn't detract from the basic 
> truth - the lower the risk/number of vulnerabilities of the OS, the better 
> off you are. As a corollary, you might also say that there is no way to 
> improve the security of a server without improving the security of the OS.

This has *nothing* to do with VM security.

The issue with VM security is that:

1. if any guest is compromised you all guests and the host are in danger.
2. if any user or admininstrator of a guest is malicious, all guests and
the host is in danger.

This threat is NOT because of any possible interaction (network/services
etc.) between
the guests and/or the host. It is because of a completely different
attack vector,
the VM system. The 'virtual hardware' that *all* host and guest OS
systems implicitly
trust to behave well can be subverted.

You should NEVER trust a virtual machine to properly isolate the guests.
It is a good approximation to having separate boxes, but it is NOT
a security barrier.


>> > No matter how you twist the logic, however, a VM provides a good level of
>> > application domain security, from the standpoint that each set of domain
>> > users and applications can only see the services provided within that
>> > domain guest OS.
>>
>>The phrase "application domain security" is a cover-up statement that
>>means "I have already decided to run the multiple things on one box
>>because I am cheap, and I need to invent reasons why I can continue
>>doing so".
> 
> Huh?? Do you know what an application domain is? Guess not - here's a 
> definition:
> 
> Application + Users + Access Method = Application Domain
> 
> Examples: File/Print, httpd, DB, . . .
> 
> The more discrete the security model (i.e. File/Print users are not valid 
> on the httpd server) the better.

What you try to describe in a somewhat clumsy and round about way
corresponds to
moving different "applications" to their respective/isolated machines.

This is actually a good thing to do for security. However, depending on the
applications and the interactions between them, you may sometimes end up
being
with a more complex/less secure architecture. But this is not the point.

What you fail to realize is that, when you try to implement this using a
VM system,
you actually break the isolation. The fact that well behaved
applications and OS's
work peacefully side by side under a VM setup DOES NOT mean that a
malicious program
and/or user is not able to break that isolation.

Consider a web application login form with an SQL injection vulnerability.
It validates the users and works perfectly fine %100 of the time, passes all
tests. Denies incorrect passwords etc. UNTIL one malicious user decides
to enter
' or 1=1;-- as his password.

In a VM system the security of the *entire* system depends on the
weakest link
in only one of the OS's.

To continue your example, you can install as many OpenBSD guests as you
like.
It takes one windows/linux whatever guest to break them all. That is why the
protections do not 'add up'.

Can

Reply via email to