Well, this post seems to get a lot of attention throughout the Internet. I
normally do not participate on argumentations about opinions. However, I
feel like I should get involved, as this is the field I am currently
commencing my PhD research in.

First, I think Theo is right when he states, that adding another layer of
software doesn9t increase security. That9s what we all learned painfully in
the past 
Chroot and jails come to mind
 (One has to dig deeper to find the
problem) It is also true that the x86 was never designed to provide
virtualization, besides, it also lacks proper separation. It wasn9t designed
to be a success
 it just happened and we have to live with it. (This reminds
me of Microsoft introducing their extension to DOS, called Windows)
There are A LOT of caveats when it comes to virtualize the x86 architecture.
That9s the reason why Intels VT and AMDs SVM are necessary at all. (SVM
which, btw, stands for secure virtual machine - marketing is also something
we have to live with, whether you believe in it or not.)

It would be desirable to start over, design a new, none backwards
compatible, virtualizable hardware. Best, put an extra abstraction layer on
top of the hardware (put it in the BIOS or Firmware) and only deal with
those interfaces. Add some crypto features
 et. voila. **sigh**

Unfortunately, we are not living in a perfect world. So what can
virtualization do for us? Speaking of paravirtualization as in the previous
posts, it may add a little security in comparison to jails, but it adds a
lot of convenience as handling of VMs gets easier.
Which is the main selling point, so the major interest in the near future
will be the handling of those virtual machines, and unfortunately not
security. Security, or the way we (I/some) see it, does not sell as good as
features. I have no doubt that exploiting a VM will become reality sooner or
later.

However, I would like to keep the discussion going, maybe in a less
offensive way?!
Cheers Carlo

Reply via email to