On 10/25/07, Theo de Raadt <[EMAIL PROTECTED]> wrote:

> You're also a sysadm who refuses to read a paper written by a google
> researcher, who's team found massive bugs in every VM.

That's not quite correct. Restating (yet) again:

1. Ormandy [1] states that Xen's design is congruent with good security

2. Ormandy doesn't actually demonstrate a DomU -> Dom0 escalation, and
in fact, didn't test any HVMs at all.

3. Ormandy hypothesizes that based on Qemu flaws, there may be lurking
issues. However, Qemu compromises != Xen HVM Qemu compromises

Furthermore:

1. Upstream patches already exist [2] in response to Ormandy's bug report [3]

Adam

[1] http://taviso.decsystem.org/virtsec.pdf

[2] https://launchpad.net/ubuntu/+source/xen-3.1/

[3] http://secunia.com/advisories/26986/
-- 
"Invincibility is in oneself, vulnerability in the opponent." -- Sun Tzu

Reply via email to