> On 7 Jan 2018, at 17:11, Andrew Cooper <andrew.coop...@citrix.com> wrote:
> 
> 
>>>> Since PVH does not yet support PCI passthrough, are there other
>>>> recommended SP3 mitigations for 64-bit PV driver domains?
>>> Lock them down?  Device driver domains, even if not fully trusted, are
>>> going to be part of the system and therefore at least semi-TCB.
>>> 
>>> If an attacker can't run code in your driver domain (and be aware of
>>> things like server side processing, JIT of SQL, etc as "running code"
>>> methods), they aren't in a position to mount an SP3 attack.
>> Well, the main reason why driver domains are used in Qubes OS is
>> assumption that it is not possible to really "lock them down", given
>> full OS (Linux) running inside and being exposed to the outside world
>> (having network adapters, USB controllers etc). There are so many
>> components running them, that for sure some of them are buggy. Just some
>> examples exploitable in the near past: DHCP client, Bluetooth stack.
>> 
>> If we'd believe that handling those devices exposed to the outside world
>> is "safe", we wouldn't use driver domains at all...
> 
> Indeed, but they are in a better position than arbitrary VMs, because
> users can't just log into them and start running code.  (I really hope...)


I wanted to point out 
https://lists.xenproject.org/archives/html/xen-devel/2018-01/msg00497.html 
<https://lists.xenproject.org/archives/html/xen-devel/2018-01/msg00497.html> 
which according to the cover letter is based on HVM and not PVH. I am not 
really sure whether this would solve some of the problems around PCI 
passthrough. 

Regards
Lars
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

Reply via email to