At 12:08 PM 10/25/2007 -0400, Stuart VanZee wrote:
The reason that people are going to #2 is that, if you are concerned about security, that is the optimal way of setting things up. One box, one task. That is true "separation". In this light, the question of if #3 is more secure than #1 is truely a moot point. BUT.... To argue that a VM running a service is more secure than a system running that same service is rather weak... if the service can be exploited, it can be exploited.
No, you need to read the last two discussion replies - they, at least, make sense.
Isolating ONE part of the discussion just posts extra traffic on the list.
Give me root access to a box (from an exploit or an account, don't matter) and I can crash the bitch.
Very true, but is completely offtopic from the OP, but, then, that has been forgotten long ago. I think everybody can agree that issues within a VM configuration can significantly ADD security risks, *especially* if you're running an OS that are not secure by default.
The original discussion of VMs providing security for an application domain, however (per the summary posted about an hour ago), has nothing to do with this level of vulnerability. Providing separation of application domains in an enterprise adds an excellent level of security for the application users and admins. The fact that VM systems compound vulnerabilities, though very significant, is not an issue related to the OP. The fact that running those application domain on separate hardware to provide better security is also a option, but, again, not related to the OP. The fact that OBSD does not operate in that enterprise space, choosing, instead, to focus on core services, is again, not related to the OP.
All of these tangential discussions have added a lot of good information to the list archives, thanks to all!
Lee