On Tue, Dec 18, 2007 at 08:48:46PM +0100, ropers wrote:
> The reason for the controversy appears to be that it's currently en
> vogue in some quarters (not here) to ascribe all kinds of benefits to
> virtualization, including security benefits -- which are very much not
> really there. Virtualization introduces more complexity, complexity is
> the enemy of real security. The "security benefits" that
> virtualization introduces are mostly administrative benefits that may
> make it easier to determine that your boxes were pwned by a sloppy
> attacker, but OpenBSD people prefer their boxes to be as pwnage-proof
> as humanely possible, ie. to make sure their boxes don't get pwned to
> start with. And that's much easier to do w/o virtualization. So
> whatever you do, don't cite security claims as reasons for
> OpenBSD/Xen, unless you fancy your OpenBSD "street cred" getting
> rather unceremoniously shredded into little itsy bitsy pieces.
> 
> Hope this helps, thanks and regards,
> --ropers
> 

just to give you a crazy example what people/vendors think is a
possible "security benefit":

some people have the idea to use virtualization on a central monster
firewall to segregate multiple departments on a single physical
device. this "firewall virtualization" feature is supported by
Cizzco-Eeeh and other vendors. this is just a scary useability feature
to give the admin the opportunity to offload some work to
customers/departments..

of course, it is a very bad idea from a security point of view; one
example of VM vulnerability was given by my early vic(4) driver which
caused segfaults of the GSX server host side.

i think it is much better, if not doing it correctly by using
distributed edge firewalls, to use pf anchors, tables, etc. to support
multiple firewall operators.

anyway, blah, there is a big controversy about VMs and Xen, but it
could be at least useful for things like testing, development, and
other edge cases.

reyk

Reply via email to