>If you're running on a virtual machine, a) you can't power-off with
impunity,

Of course you can. You can boot a VM off of read only media as easily as you
can a physical machine - although I have not had any luck using the large
floppy image under VMWare server.

>b) a compromised firewall virtual machine has SUSE's full
toolset on an accessible hard drive 

Its not that simple.  This assumes (as does C) that there is an unknown
attack vector exploitable from a compromised Leaf system, which the attacker
knows about and has not been patched.  Simply breaking into virtual Leaf
will not provide you with access to the host system.

>c) you can never be entirely sure just how far the penetration got, so the
whole system is suspect! 

This argument is actually valid, especially in light of some past
vulnerabilities.  

The decision to virtualize the firewall should be weighed against the
potential for compromise of the firewall and the possibility that the hacker
would then be able to determine that they were running in a VM (probably
could) and using that compromised system, could then access the host.  I
think that risk scenario is completely acceptable for most SOHO
environments.

- Bob Coffman


-------------------------------------------------------------------------
This SF.net email is sponsored by: Microsoft
Defy all challenges. Microsoft(R) Visual Studio 2008.
http://clk.atdmt.com/MRT/go/vse0120000070mrt/direct/01/
------------------------------------------------------------------------
leaf-user mailing list: leaf-user@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/leaf-user
Support Request -- http://leaf-project.org/

Reply via email to