On 10/23/07, Theo de Raadt <[EMAIL PROTECTED]> wrote:
> > Virtualization seems to have a lot of security benefits.
>
> You've been smoking something really mind altering, and I think you
> should share it.

Sure! Here's some research one of my colleagues (with whom I've
discussed this a lot) did on the topic last year.

http://shell.cse.ucdavis.edu/~bill/virt/virt.pdf

Ormandy's paper sure is interesting, though. Certainly adds new data.
Still, it seems that taking checksums from Dom0 against DomU, with
other security layers in front of the DomUs (including a good
firewall) doesn't hurt. Layers of defense and all that.

> x86 virtualization is about basically placing another nearly full
> kernel, full of new bugs, on top of a nasty x86 architecture which
> barely has correct page protection.  Then running your operating
> system on the other side of this brand new pile of shit.

Security is really hard, no doubt about it. It just takes a bug in SSH
or IPv6 and you've got trouble. But in some cases, the issues can be
salvaged to some acceptable criterion, for some definition of
acceptable for some particular group.

Or perhaps not. That's a risk-benefit analysis.

> You've seen something on the shelf, and it has all sorts of pretty
> colours, and you've bought it.
>
> That's all x86 virtualization is.

Well, I bought it because it's been working for me for the past few
years, and virtualization adds useful capabilities, with or without
security benefits, for my purposes.

You and the other OpenBSD developers have created an operating system
that suits your purposes, and you kindly share it with the rest of the
world, no strings attached. I'm grateful, and use OpenBSD extensively
in ways that work with the purposes you've developed it. (Basically,
as much as I can until I encounter some showstopping problem.)

But eventually, I find I need other tools for certain things --
parallel scientific programming, SANs, running applications that don't
have a snowball's chance in hell of running on OpenBSD, writing
applications using runtimes that aren't supported well/at all on
OpenBSD, etc. etc.

Since I can't run these things on OpenBSD, I will have to run them on
someone's buggy, barely correct, proprietary security-hole ridden OS
anyways. And if I'm forced to do that, I'm going to use an
architecture that at least mitigates the common CIA issues as best as
it can, given those circumstances.

And of course, continue to use OpenBSD wherever appropriate, buy the
OpenBSD project's CDs, encourage others at my University to use it and
do the same, and make donations whenever I can.

Adam
-- 
"Invincibility is in oneself, vulnerability in the opponent." -- Sun Tzu

Reply via email to