On Tue, 2010-11-23 at 15:28 -0500, Brad Tilley wrote:
> Nick Holland wrote:
> 
> > what's changed?
> > Layering? Nope.
> > Crappy programming?  Nope.
> > Better hardware?  not really.
> > Features-before-security?  Nope.
> 
> Good points. The goals of virtualization are, easy management, power
> savings, quick provisioning and deployment, redundancy, etc. When you
> talk about security and virtualization at the guest level, the
> prevailing attitude is, "If it gets hacked, we'll just restore it from a
> known good snapshot... problem solved."

With the way most of those app stacks are it's more like
"We'll restore it from snapshot when one of our admins or developers fat
fingers and blows it all to hell.  We honestly can't distinguish
malicious behavior from a 3rd party from our existing application bugs."
> 
> I don't hear much talk at all about the host machine and security (the
> real server that hosts all the pretend servers is just assumed to be
> OK). There just seems to be a lot of trust in the vendors.

No more trust than what they are putting into the OS distributions
management chooses nor the application stacks management chooses.
What's the point of compromising the OS or hypervisors when the
memcached servers are open to the entire Internet, and the app stack was
designed to make injection attacks easy.

Chris Dukes

Reply via email to