On Fri, 26 Nov 2010 17:50:13 +0100
Joachim Schipper <joac...@joachimschipper.nl> wrote:

> Let me add one more reason to the ones already offered: there are *many*
> side-channel attacks that can cross VM barriers. In other words, don't
> do any sort of crypto (SSH, IPsec...) on virtualized machines, unless
> you trust every VM on the same physical box.

The cpu caches (encryption keys etc.) grabbed my interest at the
beginning but were then not mentioned further and their best examples
were not amasingly problematic for my purposes. The password grabbing
timing attack may be a concern if the hoster sets default management
passwords and must be kept in mind, but once setup I use ssh keys not
passwords and OTP once logged in. I don't doubt that more and more
attacks will see the light of day and so it is interesting but I
certainly wouldn't throw VMs to the wall due to this paper, but it
certainly reaffirms native to be far better and raises further questions
to marketers that say vms are good to use FOR security reasons.

Thanks for the link though and please send any others on this topic you
find.

Reply via email to