WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
Xen

xen-devel

[Top] [All Lists]

Re: [Xen-devel] [PATCH][ACM] kernel enforcement of vbd policies via blkb

To: Reiner Sailer <sailer@xxxxxxxxxx>
Subject: Re: [Xen-devel] [PATCH][ACM] kernel enforcement of vbd policies via blkback driver
From: Harry Butterworth <harry@xxxxxxxxxxxxxxxxxxxxxxxxxxxxx>
Date: 2006年7月27日 18:06:50 +0100
Cc: Andrew Warfield <andrew.warfield@xxxxxxxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxx, xense-devel@xxxxxxxxxxxxxxxxxxx, Bryan D Payne <bdpayne@xxxxxxxxxx>, ncmike@xxxxxxxxxx
Delivery-date: 2006年7月27日 10:07:21 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
In-reply-to: <OFD4B753CA.C283F545-ON852571B8.005D20B2-852571B8.005D3F73@xxxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
References: <OFD4B753CA.C283F545-ON852571B8.005D20B2-852571B8.005D3F73@xxxxxxxxxx>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
On Thu, 2006年07月27日 at 12:58 -0400, Reiner Sailer wrote:
>
>
> Harry Butterworth <harry@xxxxxxxxxxxxxxxxxxxxxxxxxxxxx> wrote on
> 07/27/2006 12:36:43 PM:
>
> > On Thu, 2006年07月27日 at 17:26 +0100, Harry Butterworth wrote:
> > 
> > > untrusted driver domain <-> trusted encryption domain <->
> FE-domain
> > > hypervisor
> > > trusted access control domain
> > 
> > Another argument in favour of this kind of approach is that if your
> BE
> > is something like a fibrechannel driver for a SAN, there isn't
> actually
> > any security on the SAN side of it so any guarantees provided by the
> > driver domain are pretty much worthless.
> > 
> > Harry.
> > 
>
> We are talking about scalable, secure, and efficient local device
> virtualization. 
Even with local devices there is no security on the device side of the
device driver. Consider the case of a locally attached sata drive
containing 2 partitions, one for each of two domains. It's not unheard
of for disk drives to write the data in the wrong place. Or read and
return the wrong block. Happens all the time.
>
> The argumentation for network devices is very different and also
> interesting. There is a whole new discussion about how to establish
> trust into remote parties. 
>
> Reiner
> _______________________________________________
> Xen-devel mailing list
> Xen-devel@xxxxxxxxxxxxxxxxxxx
> http://lists.xensource.com/xen-devel 
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
<Prev in Thread] Current Thread [Next in Thread>
Previous by Date: Re: [Xen-devel] [PATCH][ACM] kernel enforcement of vbd policies via blkback driver , Reiner Sailer
Next by Date: Re: [Xen-devel] [PATCH][ACM] kernel enforcement of vbd policies via blkback driver , Harry Butterworth
Previous by Thread: Re: [Xen-devel] [PATCH][ACM] kernel enforcement of vbd policies via blkback driver , Reiner Sailer
Next by Thread: Re: [Xen-devel] [PATCH][ACM] kernel enforcement of vbd policies via blkback driver , Harry Butterworth
Indexes: [Date] [Thread] [Top] [All Lists]

Copyright ©, Citrix Systems Inc. All rights reserved. Legal and Privacy
Citrix This site is hosted by Citrix

AltStyle によって変換されたページ (->オリジナル) /