On Fri, Feb 4, 2011 at 20:21, Joseph L. Casale
<jcas...@activenetwerx.com> wrote:
>>Well, I hear of people running pfSense in a VM, and I wonder how do you
>>avoid exposing the host OS to the network?  How can a firewall be run in a
>>VM and not leave the host OS hanging out to be attacked?
>
> Well, if the interface is setup in a bridge with nothing else, what exactly is
> addressable that you can connect to and then hack? Now add a vm and plug
> a nic into this bridge and put pfsenses wan designation on it. When you show
> me one case of the host being compromised I'll believe it, until then it's not
> been done as far as I know...

If the OS is a VM, then you might want to understand Blue Pill:

http://en.wikipedia.org/wiki/Blue_Pill_%28malware%29

And, I believe, it's just the beginning of the threats for virtual environments.

Kurt

---------------------------------------------------------------------
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org

Reply via email to