SlideShare a Scribd company logo
1 of 14
Download to read offline
In-Guest Mechanisms to
Strengthen Guest Separation
XenSummit 2013
Philip Tricca
<philip.tricca@citrix.com>
Background
• Xen does security well
– Strong isolation using
hardware
– Doesn’t try to do too much

• Offload complexity to
VMs / userspace
– Drivers / QEMU / inter-VM
communication (IVC)
– Keeps Xen small
– Separation now requires
guest cooperation

• Value is added when VMs
communicate / cooperate
provided that …
– Separation is preserved &
mechanisms are strong
– Sensible policy semantics
are preserved
– By “policy” I mean FLASK /
XSM / SELinux
User-space mechanisms
• Some work we’ve done
– Strengthen separation
between guest specific
resources in dom0
– sVirt implementation on
XenClient XT
– Separate QEMU instances

• Some work we’re doing
– Strengthen separation
between guest VMs
– Multi-tenant orchestration
of mutually distrusting orgs
– sVirt for management

• Apply these architectures
to new work
– Inter-VM communication
(IVC)
– Policy semantics in V4V in
XenClient XT
– IVC using front/back driver
model
Caution
• Will move around a lot
– Architectures that touch all
aspects of virtualization
– High-level concept to low-level
implementation
– Ask questions

• References provided
– Time constraints
– Please engage ‘off-line’
Diagrams & Conventions
• Colors
– Green for ‘platform’ stuff (Xen
+ VMs)
– NDVM = Network Driver VM
– Blue & orange for ‘guest’ VMs

vm2A A
vm1 A
vm0

process

vm2A A
vm1 B
vm0
A

• Boxes
– VMs are above ‘Xen’
– Processes are inside VMs
– Not drawn to scale, may shrink
/ grow

• Arrows denote binding or
interaction
• Security boundaries:
something_t is a FLASK type
(SELinux / XSM)

domA_t

dom0

processA_t
domB_t

processB

dom0

vm0A

NDVM
processB_t
Xen
Hardware

vm0B
sVirt
• Separation between
guests relies on
mechanisms in dom0
/ Linux
– QEMU instances
backing guests
– Run with ‘root’ perms
– Add SELinux but
policy granularity is
still wrong
– qemu_t r/w blktap_t

qemu1

blktap_t

dom0

vm1

qemu_t

qemu0

Xen
Hardware

vm0
sVirt
• Goals
– Separate QEMU
instances
– Limit access to
appropriate resources

qemu1
blktap_t:cXX

qemu_t:cXX
dom0

• Implementation
– Assign random MCS
category to QEMU &
relevant resources
– Ensure category
uniqueness

vm1

qemu0

blktap_t:cYY

qemu_t:cYY
Xen
Hardware

vm0
sVirt Details
• Specification from
SELinux community
– Not a new thing: 2008
– http://selinuxproject.org/p
age/Svirt_requirements_v1
.0
– libvirt security driver

• XenClient XT
implementation
– Minimally invasive
– libvirt not an option
– Binary interposed between
toolstack and QEMU

• SELinux constraint / categories
– Sets are cool
– http://twobit.us/blog/2011/07/u
nderstanding-multi-levelsecurity-part-3/

• OpenSource
– Code:
https://github.com/flihp/svirtinterpose
– Analysis:
http://twobit.us/blog/2012/02/s
virt-in-xenclient/
– Works on Xen OSS (requires
some tweaks)
– Interest from upstream?
Multi-Tennant Orchestration
• On-going work in
XenClient XT
• Goals
– Provide separate orgs
management
mechanisms on a single
platform
– Maintain mutual distrust
between orgs

• Increasingly relevant
– Multiple virtualization
mgmt stacks
– Security concerns in
larger ‘cloud’ context
– BYOD / multi-personality
devices

• Who owns the device?
• Which interests does
the device represent?
Multi-tenant Orchestration
• Similar issue with
XSM & guest VMs
– Guest VMs use a
single XSM type
– See domHVM_t
‘self’ rules
– Implications when
we consider groups
of VMs belonging to
different orgs

domHVM_t
hvm_guest_t
vm2A A
vm1 A
vm0

domHVM_t

dom0

vm2B B
vm1 B
vm0
NDVM
Xen
Hardware
Multi-tenant Orchestration
• VM dedicated to
orchestration
– Represents the interests /
actions of a single org
– Bootstrapping non-trivial
– Unique category to
represent each mgmt
realm
– Prevent cross realm
actions

• sVirt architecture
applied to similar
problem
– Work on-going

domHVM_t:cYY

mgmt_t:cYY
mgmtA

vm2A A
vm1 A
vm0

mgmt_t:cXX
domHVM_t:cXX

mgmtB

vm2B B
vm1 B
vm0
NDVM
Xen
Hardware
Inter-VM Communication
• Short discussion on xen- • Proposed new approach
devel back in June
– Negotiate shared pages
– http://lists.xen.org/archi
ves/html/xendevel/201306/msg01123.html
– Alternative to V4V from
XenClient is imminent

through rendezvous
service
– Possibly a 3rd party
daemon
– Possibly through
xenstore

• Doing this with existing
mechanisms is a ‘very
good thing’
IVC policy model
• policy semantics of V4V were
desirable
– First-class xen object == clear
XSM policy
– Send / receive semantics
– Communication channels
between VMs were clear

• Policy for new IVC mechanism
– Coms channel reflected in XSM
for grant mechanism
– Interesting possibility to extend
XSM to vsock connections to
create higher-level semantics

• Feasibility?
– Caution against introducing
new / competing policy
mechanisms
– Seems connection mgmt
will land in XenStore
anyways
– XenStore perms sufficient?
– User-space object
manager?
– BOF?
Policy Semantics
• Flexible, loosely-coupled,
disaggregated systems
– Good engineering practices
enable good security
– Make changes easier
– Make dependencies
obvious
– Clear interfaces

• Hazards w/r to separation
/ policy goals can be
subtle

• Consider attack scenarios
w/r to
– Enforcement mechanisms
– Desired policy semantics

• What will policy look like
after addition of new
mechanism?

More Related Content

What's hot

Cloud Computing Hypervisors and Comparison Xen KVM
Cloud Computing Hypervisors and Comparison Xen KVM Cloud Computing Hypervisors and Comparison Xen KVM
Cloud Computing Hypervisors and Comparison Xen KVM
cloudresearcher
 
LinuxCon Japan 13 : 10 years of Xen and Beyond
LinuxCon Japan 13 : 10 years of Xen and BeyondLinuxCon Japan 13 : 10 years of Xen and Beyond
LinuxCon Japan 13 : 10 years of Xen and Beyond
The Linux Foundation
 

What's hot (20)

Rootlinux17: An introduction to Xen Project Virtualisation
Rootlinux17:  An introduction to Xen Project VirtualisationRootlinux17:  An introduction to Xen Project Virtualisation
Rootlinux17: An introduction to Xen Project Virtualisation
 
PVH : PV Guest in HVM container
PVH : PV Guest in HVM containerPVH : PV Guest in HVM container
PVH : PV Guest in HVM container
 
Xen io
Xen ioXen io
Xen io
 
XPDS14 - Towards Massive Server Consolidation - Filipe Manco, NEC
XPDS14 - Towards Massive Server Consolidation - Filipe Manco, NECXPDS14 - Towards Massive Server Consolidation - Filipe Manco, NEC
XPDS14 - Towards Massive Server Consolidation - Filipe Manco, NEC
 
LCEU13: Securing your cloud with Xen's advanced security features - George Du...
LCEU13: Securing your cloud with Xen's advanced security features - George Du...LCEU13: Securing your cloud with Xen's advanced security features - George Du...
LCEU13: Securing your cloud with Xen's advanced security features - George Du...
 
OWF: Xen - Open Source Hypervisor Designed for Clouds
OWF: Xen - Open Source Hypervisor Designed for CloudsOWF: Xen - Open Source Hypervisor Designed for Clouds
OWF: Xen - Open Source Hypervisor Designed for Clouds
 
Xen PV Performance Status and Optimization Opportunities
Xen PV Performance Status and Optimization OpportunitiesXen PV Performance Status and Optimization Opportunities
Xen PV Performance Status and Optimization Opportunities
 
CIF16/Scale14x: The latest from the Xen Project (Lars Kurth, Chairman of Xen ...
CIF16/Scale14x: The latest from the Xen Project (Lars Kurth, Chairman of Xen ...CIF16/Scale14x: The latest from the Xen Project (Lars Kurth, Chairman of Xen ...
CIF16/Scale14x: The latest from the Xen Project (Lars Kurth, Chairman of Xen ...
 
OSSEU18: NVDIMM and Virtualization - George Dunlap, Citrix
OSSEU18: NVDIMM and Virtualization  - George Dunlap, CitrixOSSEU18: NVDIMM and Virtualization  - George Dunlap, Citrix
OSSEU18: NVDIMM and Virtualization - George Dunlap, Citrix
 
Xen on ARM for embedded and IoT: from secure containers to dom0less systems
Xen on ARM for embedded and IoT: from secure containers to dom0less systemsXen on ARM for embedded and IoT: from secure containers to dom0less systems
Xen on ARM for embedded and IoT: from secure containers to dom0less systems
 
XS Boston 2008 XenLoop
XS Boston 2008 XenLoopXS Boston 2008 XenLoop
XS Boston 2008 XenLoop
 
Xen Project for ARM Servers
Xen Project for ARM ServersXen Project for ARM Servers
Xen Project for ARM Servers
 
XPDS16: Xen Orchestra: building a Cloud on top of Xen - Olivier Lambert & Jul...
XPDS16: Xen Orchestra: building a Cloud on top of Xen - Olivier Lambert & Jul...XPDS16: Xen Orchestra: building a Cloud on top of Xen - Olivier Lambert & Jul...
XPDS16: Xen Orchestra: building a Cloud on top of Xen - Olivier Lambert & Jul...
 
Cloud Computing Hypervisors and Comparison Xen KVM
Cloud Computing Hypervisors and Comparison Xen KVM Cloud Computing Hypervisors and Comparison Xen KVM
Cloud Computing Hypervisors and Comparison Xen KVM
 
XPDDS18: Windows PV Drivers Project: Status and Updates - Paul Durrant, Citri...
XPDDS18: Windows PV Drivers Project: Status and Updates - Paul Durrant, Citri...XPDDS18: Windows PV Drivers Project: Status and Updates - Paul Durrant, Citri...
XPDDS18: Windows PV Drivers Project: Status and Updates - Paul Durrant, Citri...
 
XPDS14 - Xen on ARM: Status and Performance - Stefano Stabellini, Citrix
XPDS14 - Xen on ARM: Status and Performance - Stefano Stabellini, CitrixXPDS14 - Xen on ARM: Status and Performance - Stefano Stabellini, Citrix
XPDS14 - Xen on ARM: Status and Performance - Stefano Stabellini, Citrix
 
Xen Project 15 Years down the Line
Xen Project 15 Years down the LineXen Project 15 Years down the Line
Xen Project 15 Years down the Line
 
LinuxCon Japan 13 : 10 years of Xen and Beyond
LinuxCon Japan 13 : 10 years of Xen and BeyondLinuxCon Japan 13 : 10 years of Xen and Beyond
LinuxCon Japan 13 : 10 years of Xen and Beyond
 
XS 2008 Boston Capacity Planning
XS 2008 Boston Capacity PlanningXS 2008 Boston Capacity Planning
XS 2008 Boston Capacity Planning
 
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...
 

Similar to XPDS13: In-Guest Mechanism to Strengthen Guest Separation - Philip Tricca, Citrix

CloudStack - LinuxFest NorthWest
CloudStack - LinuxFest NorthWestCloudStack - LinuxFest NorthWest
CloudStack - LinuxFest NorthWest
ke4qqq
 
Virtualization 101 - DeepDive
Virtualization 101 - DeepDiveVirtualization 101 - DeepDive
Virtualization 101 - DeepDive
Amit Agarwal
 

Similar to XPDS13: In-Guest Mechanism to Strengthen Guest Separation - Philip Tricca, Citrix (20)

Using CloudStack With Clustered LVM
Using CloudStack With Clustered LVMUsing CloudStack With Clustered LVM
Using CloudStack With Clustered LVM
 
Presentation citrix cloud platform for infrastructure as a service
Presentation   citrix cloud platform for infrastructure as a servicePresentation   citrix cloud platform for infrastructure as a service
Presentation citrix cloud platform for infrastructure as a service
 
Containers 101 Meetup - VMs vs Containers
Containers 101 Meetup - VMs vs ContainersContainers 101 Meetup - VMs vs Containers
Containers 101 Meetup - VMs vs Containers
 
Lessons learned so far in operationalizing NFV
Lessons learned so far in operationalizing NFVLessons learned so far in operationalizing NFV
Lessons learned so far in operationalizing NFV
 
XPDS14: OpenXT - Security and the Properties of a Xen Virtualisation Platform...
XPDS14: OpenXT - Security and the Properties of a Xen Virtualisation Platform...XPDS14: OpenXT - Security and the Properties of a Xen Virtualisation Platform...
XPDS14: OpenXT - Security and the Properties of a Xen Virtualisation Platform...
 
CloudStack - LinuxFest NorthWest
CloudStack - LinuxFest NorthWestCloudStack - LinuxFest NorthWest
CloudStack - LinuxFest NorthWest
 
Platform Security Summit 18: Xen Security Weather Report 2018
Platform Security Summit 18: Xen Security Weather Report 2018Platform Security Summit 18: Xen Security Weather Report 2018
Platform Security Summit 18: Xen Security Weather Report 2018
 
Norway VMUG Tour - The Architecture Behind Policy-Driven Data Protection - A ...
Norway VMUG Tour - The Architecture Behind Policy-Driven Data Protection - A ...Norway VMUG Tour - The Architecture Behind Policy-Driven Data Protection - A ...
Norway VMUG Tour - The Architecture Behind Policy-Driven Data Protection - A ...
 
Virtualization in cloud computing
Virtualization in cloud computingVirtualization in cloud computing
Virtualization in cloud computing
 
Xen revisited
Xen revisitedXen revisited
Xen revisited
 
unit-2.pptx
unit-2.pptxunit-2.pptx
unit-2.pptx
 
Hypervisor selection in CloudStack
Hypervisor selection in CloudStackHypervisor selection in CloudStack
Hypervisor selection in CloudStack
 
Virtualization 101 - DeepDive
Virtualization 101 - DeepDiveVirtualization 101 - DeepDive
Virtualization 101 - DeepDive
 
9-cloud-computing.pdf
9-cloud-computing.pdf9-cloud-computing.pdf
9-cloud-computing.pdf
 
Xen and Client Virtualization: the case of XenClient XT
Xen and Client Virtualization: the case of XenClient XTXen and Client Virtualization: the case of XenClient XT
Xen and Client Virtualization: the case of XenClient XT
 
oneM2M - Facing the challenges of M2M security and privacy
oneM2M - Facing the challenges of M2M security and privacyoneM2M - Facing the challenges of M2M security and privacy
oneM2M - Facing the challenges of M2M security and privacy
 
Nagios Conference 2011 - William Leibzon - Nagios In Cloud Computing Environm...
Nagios Conference 2011 - William Leibzon - Nagios In Cloud Computing Environm...Nagios Conference 2011 - William Leibzon - Nagios In Cloud Computing Environm...
Nagios Conference 2011 - William Leibzon - Nagios In Cloud Computing Environm...
 
Xen and the art of virtualization
Xen and the art of virtualizationXen and the art of virtualization
Xen and the art of virtualization
 
Keeping OpenStack storage trendy with Ceph and containers
Keeping OpenStack storage trendy with Ceph and containersKeeping OpenStack storage trendy with Ceph and containers
Keeping OpenStack storage trendy with Ceph and containers
 
NECOS Objectives
NECOS ObjectivesNECOS Objectives
NECOS Objectives
 

More from The Linux Foundation

More from The Linux Foundation (20)

ELC2019: Static Partitioning Made Simple
ELC2019: Static Partitioning Made SimpleELC2019: Static Partitioning Made Simple
ELC2019: Static Partitioning Made Simple
 
XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...
XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...
XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...
 
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...
 
XPDDS19 Keynote: Unikraft Weather Report
XPDDS19 Keynote:  Unikraft Weather ReportXPDDS19 Keynote:  Unikraft Weather Report
XPDDS19 Keynote: Unikraft Weather Report
 
XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...
XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...
XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...
 
XPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, Xilinx
XPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, XilinxXPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, Xilinx
XPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, Xilinx
 
XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...
XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...
XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...
 
XPDDS19: Memories of a VM Funk - Mihai Donțu, Bitdefender
XPDDS19: Memories of a VM Funk - Mihai Donțu, BitdefenderXPDDS19: Memories of a VM Funk - Mihai Donțu, Bitdefender
XPDDS19: Memories of a VM Funk - Mihai Donțu, Bitdefender
 
OSSJP/ALS19: The Road to Safety Certification: Overcoming Community Challeng...
OSSJP/ALS19:  The Road to Safety Certification: Overcoming Community Challeng...OSSJP/ALS19:  The Road to Safety Certification: Overcoming Community Challeng...
OSSJP/ALS19: The Road to Safety Certification: Overcoming Community Challeng...
 
OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...
 OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making... OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...
OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...
 
XPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, Citrix
XPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, CitrixXPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, Citrix
XPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, Citrix
 
XPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltd
XPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltdXPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltd
XPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltd
 
XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...
XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...
XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...
 
XPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&D
XPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&DXPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&D
XPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&D
 
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM Systems
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM SystemsXPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM Systems
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM Systems
 
XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...
XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...
XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...
 
XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...
XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...
XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...
 
XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...
XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...
XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...
 
XPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSE
XPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSEXPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSE
XPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSE
 
XPDDS19: Implementing AMD MxGPU - Jonathan Farrell, Assured Information Security
XPDDS19: Implementing AMD MxGPU - Jonathan Farrell, Assured Information SecurityXPDDS19: Implementing AMD MxGPU - Jonathan Farrell, Assured Information Security
XPDDS19: Implementing AMD MxGPU - Jonathan Farrell, Assured Information Security
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

XPDS13: In-Guest Mechanism to Strengthen Guest Separation - Philip Tricca, Citrix

  • 1. In-Guest Mechanisms to Strengthen Guest Separation XenSummit 2013 Philip Tricca <philip.tricca@citrix.com>
  • 2. Background • Xen does security well – Strong isolation using hardware – Doesn’t try to do too much • Offload complexity to VMs / userspace – Drivers / QEMU / inter-VM communication (IVC) – Keeps Xen small – Separation now requires guest cooperation • Value is added when VMs communicate / cooperate provided that … – Separation is preserved & mechanisms are strong – Sensible policy semantics are preserved – By “policy” I mean FLASK / XSM / SELinux
  • 3. User-space mechanisms • Some work we’ve done – Strengthen separation between guest specific resources in dom0 – sVirt implementation on XenClient XT – Separate QEMU instances • Some work we’re doing – Strengthen separation between guest VMs – Multi-tenant orchestration of mutually distrusting orgs – sVirt for management • Apply these architectures to new work – Inter-VM communication (IVC) – Policy semantics in V4V in XenClient XT – IVC using front/back driver model
  • 4. Caution • Will move around a lot – Architectures that touch all aspects of virtualization – High-level concept to low-level implementation – Ask questions • References provided – Time constraints – Please engage ‘off-line’
  • 5. Diagrams & Conventions • Colors – Green for ‘platform’ stuff (Xen + VMs) – NDVM = Network Driver VM – Blue & orange for ‘guest’ VMs vm2A A vm1 A vm0 process vm2A A vm1 B vm0 A • Boxes – VMs are above ‘Xen’ – Processes are inside VMs – Not drawn to scale, may shrink / grow • Arrows denote binding or interaction • Security boundaries: something_t is a FLASK type (SELinux / XSM) domA_t dom0 processA_t domB_t processB dom0 vm0A NDVM processB_t Xen Hardware vm0B
  • 6. sVirt • Separation between guests relies on mechanisms in dom0 / Linux – QEMU instances backing guests – Run with ‘root’ perms – Add SELinux but policy granularity is still wrong – qemu_t r/w blktap_t qemu1 blktap_t dom0 vm1 qemu_t qemu0 Xen Hardware vm0
  • 7. sVirt • Goals – Separate QEMU instances – Limit access to appropriate resources qemu1 blktap_t:cXX qemu_t:cXX dom0 • Implementation – Assign random MCS category to QEMU & relevant resources – Ensure category uniqueness vm1 qemu0 blktap_t:cYY qemu_t:cYY Xen Hardware vm0
  • 8. sVirt Details • Specification from SELinux community – Not a new thing: 2008 – http://selinuxproject.org/p age/Svirt_requirements_v1 .0 – libvirt security driver • XenClient XT implementation – Minimally invasive – libvirt not an option – Binary interposed between toolstack and QEMU • SELinux constraint / categories – Sets are cool – http://twobit.us/blog/2011/07/u nderstanding-multi-levelsecurity-part-3/ • OpenSource – Code: https://github.com/flihp/svirtinterpose – Analysis: http://twobit.us/blog/2012/02/s virt-in-xenclient/ – Works on Xen OSS (requires some tweaks) – Interest from upstream?
  • 9. Multi-Tennant Orchestration • On-going work in XenClient XT • Goals – Provide separate orgs management mechanisms on a single platform – Maintain mutual distrust between orgs • Increasingly relevant – Multiple virtualization mgmt stacks – Security concerns in larger ‘cloud’ context – BYOD / multi-personality devices • Who owns the device? • Which interests does the device represent?
  • 10. Multi-tenant Orchestration • Similar issue with XSM & guest VMs – Guest VMs use a single XSM type – See domHVM_t ‘self’ rules – Implications when we consider groups of VMs belonging to different orgs domHVM_t hvm_guest_t vm2A A vm1 A vm0 domHVM_t dom0 vm2B B vm1 B vm0 NDVM Xen Hardware
  • 11. Multi-tenant Orchestration • VM dedicated to orchestration – Represents the interests / actions of a single org – Bootstrapping non-trivial – Unique category to represent each mgmt realm – Prevent cross realm actions • sVirt architecture applied to similar problem – Work on-going domHVM_t:cYY mgmt_t:cYY mgmtA vm2A A vm1 A vm0 mgmt_t:cXX domHVM_t:cXX mgmtB vm2B B vm1 B vm0 NDVM Xen Hardware
  • 12. Inter-VM Communication • Short discussion on xen- • Proposed new approach devel back in June – Negotiate shared pages – http://lists.xen.org/archi ves/html/xendevel/201306/msg01123.html – Alternative to V4V from XenClient is imminent through rendezvous service – Possibly a 3rd party daemon – Possibly through xenstore • Doing this with existing mechanisms is a ‘very good thing’
  • 13. IVC policy model • policy semantics of V4V were desirable – First-class xen object == clear XSM policy – Send / receive semantics – Communication channels between VMs were clear • Policy for new IVC mechanism – Coms channel reflected in XSM for grant mechanism – Interesting possibility to extend XSM to vsock connections to create higher-level semantics • Feasibility? – Caution against introducing new / competing policy mechanisms – Seems connection mgmt will land in XenStore anyways – XenStore perms sufficient? – User-space object manager? – BOF?
  • 14. Policy Semantics • Flexible, loosely-coupled, disaggregated systems – Good engineering practices enable good security – Make changes easier – Make dependencies obvious – Clear interfaces • Hazards w/r to separation / policy goals can be subtle • Consider attack scenarios w/r to – Enforcement mechanisms – Desired policy semantics • What will policy look like after addition of new mechanism?