> Possibly, yes.  Here's why.  You're not attacking an OpenBSD host.
> 
> The hypervisor has a network stack that is engaged before any guest.
> How else can you setup virtual switches, "attach interfaces", etc.
> Assuming that stack is vulnerable in some fashion, you have the
> opportunity to attack the guests from an entirely new angle.  Moreover,
> if your hypervisor is now compromised, why try to fight your way through
> the network interface of the virtual firewall when you can attack the
> firewall or other guests directly?  Further, why even attack the guests
> through their respective virtual network interfaces when you can poison
> their virtual CPUs or other "hardware" devices?
> 
> IMO, this is a kin to the blob problem for hardware, but on a larger
> scale.  Your guests, OpenBSD or otherwise, are entirely dependent on
> another layer of software.  In this case ESXi, which is not infallible.
> 
> Does that explain it better?
> 
> jim@
> 

I'd certainly run native wherever 'fee'sable. However if it's a choice
between a stripped down Linux KVM kernel running OpenBSD and a full
blown Linux kernel server. I'd choose OpenBSD whilst worrying about
other guests and the hosts drivers etc. For firewalling if it's
protecting other non virtual hosts and/or has uncontrolled guests then
you may be adding risk to them.

Reply via email to