SlideShare uma empresa Scribd logo
1 de 29
Baixar para ler offline
Lars Kurth
Community Manager, Xen Project
Chairman, Xen Project Advisory Board
lars_kurth
Meltdown (SP3)
• XPTI: Recommended mitigation
• Followed by XPTI performance improvements – more to follow
Spectre (SP2)
• x86: By default, Xen will pick the most appropriate mitigations based on compiled in
support, loaded microcode, and hardware details, and will virtualise appropriate
mitigations for guests to use.
– Command line controls via the spec-ctrl command line option are available
– 10% net/disk performance improvements in some production scenarios
– 50s boot time improvement on some servers
Spectre (SP2)
• Arm32: Mitigation for Cortex-A15, Cortex-A12, Cortex-A17 are present in Xen 4.7 and
later (requires updated firmware)
• Arm64: SMCCC 1.1 based mitigation for Cortex-A57, Cortex-A72, Cortex-A72, Cortex-
A75 for Xen 4.10 and later.
Spectre (SP1/SP4)
• Attacker needs a suitable "gadget" running inside of the Hypervisor
• Xen has nothing similar to eBPF and no other gadgets. Static analysis by large vendors
in the community has also not yet shown anything
• SP4: microcode based mitigations are available via spec_ctrl=ssbd to enable guest
operating systems and applications to make use of microcode based mitigations
Disaggregation
• Desktop: OpenXT, SecureView, QubesOS
• Embedded: Virtuosity (Q2-Q4 2018), Crucible
• Automotive: EPAM Fusion, GlobalLogic Nautilus
Virtual Machine Introspection
• Server Virtualization: Bitdefender HVI, Zazen, AIS IntroVirt
• Security Software: Cuckoo Sandbox, DRAKVUF
Live Patching
• Server Virtualization: Citrix, Oracle, Huawei
• Cloud Computing: AWS, Oracle, Huawei, IBM Softlayer, Rackspace, … ~50% of pre-disclosure list
These technologies are well understood by a critical mass of Xen Project upstream
maintainers and committers.
Support Status
• Driver Domains: Security supported with caveats (stemming from PCI Passthrough caveats)
• Device Model Stub Domains: Vulnerabilities of a device model stub domain to a hostile driver
domain (either compromised or untrusted) are excluded from security support
Missing upstream Pieces
• Upstream Multi-Domain Build Support: OpenXT, various vendors, … do their own different things
➜ ViryaOS could be the way forward (see lists.xenproject.org/archives/html/xen-devel/2018-
05/msg01097.html)
• Lack of upstream integration testing: looking for contributions or commitment to test RCs
➜ see https://lists.xenproject.org/archives/html/xen-devel/2018-05/msg00976.html
• Linux stub domains: waiting for Invisible Things Labs contribution
Upstream support could be better if there was more active engagement from down streams
This is generally the case for security features with the exception of LP and VMI
➜ more leadership/engagement from security community needed
Measured Boot: TPM/TXT (x86) & OP-TEE (Arm)
• Desktop: OpenXT, SecureView, QubesOS (optional via Anti Evil Maid)
• Embedded: Virtuosity (Q2-Q4 2018), Crucible
• Automotive: EPAM Fusion – actively working on OP-TEE integration with Xen
• Cloud Computing: Oracle (in progress)
Not well understood by upstream maintainers and committers.
XSM:FLASK
• Desktop: OpenXT, SecureView
• Embedded: Virtuosity, Crucible
• Automotive: EPAM Fusion
Not well understood by upstream maintainers and committers. There is a desire to get XSM to a point
where we would like XSM to be supported and could recommend average users to enable; possibly
even having it on by default.
Disaggregation involves breaking up Dom0 into several domains
• These perform actions normally reserved to Dom0 ➜ meaning more permissions are needed
• XSM:FLASK is then used to relax permissions of domains that would be DomU’s
Risks from the viewpoint of the Xen Project
• High risk to enable XSM with a policy that makes the system less safe by allowing 'normal' domains to
do things they weren't able to do before
• Using XSM requires expert capability that most users will not have
• Need a way of guaranteeing that XSM + the "default policy" is at least as safe as no XSM
• Also see XSA-77 (Disaggregated domain management security status)
Possible Solutions
• A test based approach ➜ cumbersome and does not protect users modifying the policy
• An approach that allows starting privileged domains and uses XSM:FLASK to restrict permissions
• Not alone sufficient to become a supported feature
Support.md
xenbits.xenproject.org/docs/unstable/support-matrix.html
• Formalize support and security support status for Xen Functionality
• This highlighted some gaps, such as VMI, XSM, XSM:FLASK
• Some partially security supported features such as Driver Domains, Device Model Stub Domains,
Device Passthrough have raised concerns
What is needed for Features to be (security) supported
• Functional completeness, sufficient automated testing, interface stability ➜ supported
– Automated testing via OSSTEST can be waived if there is a commitment by a community member to run
their own automated tests on Xen RCs
• In most cases this is sufficient to be security supported
– But: in cases where the security team does not have the capability to fix issues, we need commitment
from outside experts to work with the team under embargo in a timely fashion
➜ Example: ARINC635 scheduler
Become a CNA
• Applied to MITRE after a an informal agreement in mid 2017
• Responsibility for awarding CNA status for FOSS projects has been moved to DWF
(so far unresponsive)
Security Process Review
• Performed analysis of Security Process with some recommendations
• Available for review at: lists.xenproject.org/archives/html/xen-devel/2018-05/msg01127.html
Observation
• Very few Security/Embedded companies are on the pre-disclosure list despite qualifying:
Only AIS, BitDefender, Invisible Things Lab are on the list
• I do not understand whether there is a valid reason or this is simply an oversight
Basic Idea: Remove Sensitive Data from the Hypervisor
• Follow-up on Spectre/Meltdown issues to reduce the risk of data leakage
• The problem: all state from all VMs is currently mapped into the hypervisor
➜ so an attacker can see secrets belonging to other VMs.
• Solution: reorganise the mappings so the absolute minimum amount of data is mapped
➜ an attacker can't access data pertaining to other VMs.
– Get rid of Directmap, etc.
– Per domain heaps
– Reduce non-relevant data that is mapped into Hypervisor context
This will be a hot topic at the Xen Project Developer Summit in Nanjing, China
Status at release of Xen 4.11
• PVH DomU (no passthrough, QEMU not required) – supported
• PVH Dom0 – experimental
• PVH Shim (backwards compatibility) – supported primarily because it has received significant testing
and was used as Meltdown mitigation
• PV / HVM code path separation: progress at around 60% through the code
Future
• Add PCI passthrough support for PVH DomU
• Performance tuning of PVH Dom0 (hypercall performance of PVH guests compared to PV)
• Complete PV / HVM code path separation
– KCONFIG configuration for PV and PVH/HVM modes (CONFIG_PV and CONFIG_HVM)
➜ significant attack surface reduction
• Make all relevant components supported
Possibilities, once PVH work has been completed
Today (Coverity based on standard x86 build) K SLOC
Xen x86 with everything enabled 237
QEMU Upstream x86 / QEMU Traditional x86 1,005 / 125
Estimates (based on manual inspection) K SLOC
x86 PVH for Intel only (no AMD)
No Server features
No XSM, No VMI
128
Additionally remove __init code (which get discarded once
hypervisor is fully set up) and additional components which are not needed for
a more static system as expected in embedded/automotive applications
110
Substantial code size and thus attack surface reduction is possible, but would require significant effort.
A more comprehensive study on x86 code size would be needed.
wiki.xenproject.org/wiki/
Category:Safety_Certification
Items I am aware of (not a complete list)
• PV drivers: input, sound & DRM (EPAM)
• Xen OP-TEE support (EPAM)
• Co-processor (GPU) sharing framework (EPAM)
• Hard real-time support (EPAM)
• Power Management & HMP (Aggios, XILINX)
• Startup latency: Boot multiple VMs in parallel from Device Tree (XILINX)
• RTOS Dom0 / Dom0-less system (Multiple)
• Code size reduction for Safety certification (Multiple)
• Inter-VM communication primitives for hypervisor mediated data exchange (BAE)
• Virtual TPMs for Xen in OpenEmbedded meta-virtualization (BrainTrust)
Full ARM 64 build with standard configuration (via make cloc) is ∼58.5K SLOC
Excludes:
• ACPI (not enabled in default config)
• Dom0
• Key Dom0 components
• Toolstack
Renesas Rcar-3 Kconfig is ∼48K SLOC today.
See lists.xenproject.org/archives/html/xen-devel/2018-04/msg01453.html for a patch under
discussion.
Potentially Feasible:
A smaller Xen configuration of around
45K SLOC may be achievable,
by disabling some core functionality
➜ not clear whether desirable and
the effort required
Cost Example: DO-178C, per 10K SLOC
DAL E (0.11 h/SLOC): ∼0.6 man years … ASIL-A
DAL C (0.20 h/SLOC): ∼1 man years … ASIL-B/C
DAL A (0.67 h/SLOC): ∼3.3 man years … ASIL-D
Hours for vendor with certification experience
Based on data from Dornerworks
Stage 2:
Create shared certification artefacts under the guidance/with support from certification partner
Adapt development processes, where feasible.
4 Complete MISRA
compliance work for
majority of issues.
MISRA Compliance
1 Identify compliance
partner that is willing to
work with the project ➜
PRQA
2 WIP: Formalize
relationship between
vendor and the project
3 Iteratively address
compliance issues within
the Xen Project
community: start with
potentially controversial
and high impact issues.
Certification Partners
1 WIP: Identify possible
certification partners and
understand the
framework they are
willing to work with.
Note: Dornerworks is a
possible partner given
past certification
experience on Xen
2 Formalize relationship
between vendor(s) and
the project
Dom0
RTOS (e.g. FreeRTOS) as
Dom0, and/or Dom0-less
stack with minimal
management tools.
Lead Community
Members
• EPAM, XILINX
• Dornerworks and Star
Lab as possible
collaborators
Minimal Xen
Create minimal Kbuild for
Xen as a reference, using
Renesas R-Car as starting
point (WIP)
Lead Community
Members
• Stefano Stabellini
• EPAM, Dornerworks,
XILINX and others as
collaborators
Reliable data about achievable minimal code size and
community challenges that need to be resolved
Note: Dom0 and Minimal Xen do not need to be
complete to get sufficient data
FreeRTOS based Dom0
• Lead: EPAM
• Commercial safety certified version called SafeRTOS
• Baseline for a Renesas FreeRTOS build: 9 SKLOC
• Would need Xenbus, Xenstore and a Toolstack (most functionality in XL is not needed)
• Hardware domains (or other similar disaggregation techniques) would be needed for drivers
• Working first prototype expected in Q3’2018
Dom0-less option
• Lead: Stefano (Xilinx) & Praveen Kumar (Washington University)
• Much less clear on how this may work, how much work it is and whether such an approach fulfils
safety requirements
• Could build on “Boot multiple VMs in parallel from Device Tree” ➜ clearly has disadvantages for x86
• Demonstrate that after boot Dom0 cannot affect the system anymore
A new proposal for a sub-project: development work has started
around 6 months ago to have something concrete when launching
• A Flexible build system
• A Secure Xen based runtime
• Containers supported natively
• Supports ARM and x86
• Targeted at Embedded and IoT
Proposal open for discussion @ lists.xenproject.org/archives/html/xen-
devel/2018-05/msg01097.html
• A multi-domain build system
• Builds multiple domains in one go
• Creates a runnable SD Card image from multiple domain builds
• Each domain build is independent and runs in a container
• Pre-configured Device Assignments
Dom0 – Alpine Linux Userspace
Dom0 – Kernel Yocto
Dom1 – Driver D Yocto
Dom2 – Driver D Alpine
apks
Image .gz
rootfs
apks
Image
format
generator
SD Card
image
Build processes and interim build
images are docker containers
➜ ease of integration for 3rd party
build systems
• Uses disaggregation, service domains and driver domains
• Measured Boot
• Supports VMs and containers
• Containers are run securely, transparently as Xen VMs
– Issue: port stage-1 Xen to Docker
See www.slideshare.net/xen_com_mgr/xpdss17-keynote-secure-
containers-with-xen-and-coreos-rkt-stefano-stabellini-aporeto
Dom0
DomS
Domain
Manager
DomU
Secure Stage-1
Xen Container
Containderd
creates
request creation (via TBD API)
L4Re (GPLv2 – dual license) by KernKonzept
• Microvisor with solid feature set
• No public repositories (only code snapshots)
• Requires CLA (Grant of © and patent license)
ACRN (3-BSD license) by Intel
• x86 only supporting some SKUs; no Arm support; no code separation
• Seems to be mostly a copy of the Xen architecture with some differences (e.g. virtio)
➜ Fundamentally a validation of Xen
• Will probably need some time before it becomes mature and complete
• Code size just under 25 SKLOC
Zircon/Fuchsia (BSD/MIT license) by Google
• Not much information available
• PATENTS file prohibits source-code modifications
Supporting Development
• Development contributions
• Assign engineers to review design RFCs and patches on upstream mailing list
(to make this easier we could add R: tags to MAINTAINERS)
• Test contributions ➜ in particular for unsupported features
• Documentation contributions ➜ some security functionality is not well documented
• Help guide some of our larger projects / initiatives
Funding
• Advisory Board membership
• Sponsoring Events and/or Interns
• Donating Hardware for the Test Lab ➜ e.g. Renesas
• Donate/sponsor Services ➜ e.g. Rackspace
• Travel for engineers to attend community events
Marketing
• User stories, articles, talks at industry events, research …
• The Xen Project can help, but do inform us when you do something
lars.kurth@xenproject.org
Picture by Lars Kurth

Mais conteúdo relacionado

Mais procurados

Securing your Cloud with Xen - SUSECon 2013
Securing your Cloud with Xen - SUSECon 2013Securing your Cloud with Xen - SUSECon 2013
Securing your Cloud with Xen - SUSECon 2013
The Linux Foundation
 

Mais procurados (20)

OSSA17 - Live patch, VMI, Security Mgmt (50 mins, no embedded demos)
OSSA17 - Live patch, VMI, Security Mgmt (50 mins, no embedded demos)OSSA17 - Live patch, VMI, Security Mgmt (50 mins, no embedded demos)
OSSA17 - Live patch, VMI, Security Mgmt (50 mins, no embedded demos)
 
Unikraft Landing Page Master Slides
Unikraft Landing Page Master SlidesUnikraft Landing Page Master Slides
Unikraft Landing Page Master Slides
 
OSSEU18: NVDIMM and Virtualization - George Dunlap, Citrix
OSSEU18: NVDIMM and Virtualization  - George Dunlap, CitrixOSSEU18: NVDIMM and Virtualization  - George Dunlap, Citrix
OSSEU18: NVDIMM and Virtualization - George Dunlap, Citrix
 
XPDS16: A Paravirtualized Interface for Socket Syscalls - Dimitri Stiliadis, ...
XPDS16: A Paravirtualized Interface for Socket Syscalls - Dimitri Stiliadis, ...XPDS16: A Paravirtualized Interface for Socket Syscalls - Dimitri Stiliadis, ...
XPDS16: A Paravirtualized Interface for Socket Syscalls - Dimitri Stiliadis, ...
 
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...
 
XPDDS19 Keynote: Unikraft Weather Report
XPDDS19 Keynote:  Unikraft Weather ReportXPDDS19 Keynote:  Unikraft Weather Report
XPDDS19 Keynote: Unikraft Weather Report
 
2018 Genivi Xen Overview Nov Update
2018 Genivi Xen Overview Nov Update2018 Genivi Xen Overview Nov Update
2018 Genivi Xen Overview Nov Update
 
Scale17x: Thinking outside of the conceived tech comfort zone
Scale17x: Thinking outside of the conceived tech comfort zoneScale17x: Thinking outside of the conceived tech comfort zone
Scale17x: Thinking outside of the conceived tech comfort zone
 
OSSNA18: Xen Beginners Training
OSSNA18: Xen Beginners Training OSSNA18: Xen Beginners Training
OSSNA18: Xen Beginners Training
 
OSSJP/ALS19: The Road to Safety Certification: Overcoming Community Challeng...
OSSJP/ALS19:  The Road to Safety Certification: Overcoming Community Challeng...OSSJP/ALS19:  The Road to Safety Certification: Overcoming Community Challeng...
OSSJP/ALS19: The Road to Safety Certification: Overcoming Community Challeng...
 
XPDDS18: Windows PV Drivers Project: Status and Updates - Paul Durrant, Citri...
XPDDS18: Windows PV Drivers Project: Status and Updates - Paul Durrant, Citri...XPDDS18: Windows PV Drivers Project: Status and Updates - Paul Durrant, Citri...
XPDDS18: Windows PV Drivers Project: Status and Updates - Paul Durrant, Citri...
 
XPDS14 - Zero-Footprint Guest Memory Introspection from Xen - Mihai Dontu, Bi...
XPDS14 - Zero-Footprint Guest Memory Introspection from Xen - Mihai Dontu, Bi...XPDS14 - Zero-Footprint Guest Memory Introspection from Xen - Mihai Dontu, Bi...
XPDS14 - Zero-Footprint Guest Memory Introspection from Xen - Mihai Dontu, Bi...
 
Scale14x: Are today's foss security practices robust enough in the cloud era ...
Scale14x: Are today's foss security practices robust enough in the cloud era ...Scale14x: Are today's foss security practices robust enough in the cloud era ...
Scale14x: Are today's foss security practices robust enough in the cloud era ...
 
OSSEU17: How Open Source Project Xen Puts Security Software Vendors Ahead of ...
OSSEU17: How Open Source Project Xen Puts Security Software Vendors Ahead of ...OSSEU17: How Open Source Project Xen Puts Security Software Vendors Ahead of ...
OSSEU17: How Open Source Project Xen Puts Security Software Vendors Ahead of ...
 
XPDDS18: Design Session - SGX deep dive and SGX Virtualization Discussion, Ka...
XPDDS18: Design Session - SGX deep dive and SGX Virtualization Discussion, Ka...XPDDS18: Design Session - SGX deep dive and SGX Virtualization Discussion, Ka...
XPDDS18: Design Session - SGX deep dive and SGX Virtualization Discussion, Ka...
 
ALSS14: Xen Project Automotive Hypervisor (Demo)
ALSS14: Xen Project Automotive Hypervisor (Demo)ALSS14: Xen Project Automotive Hypervisor (Demo)
ALSS14: Xen Project Automotive Hypervisor (Demo)
 
Scale 12x Securing Your Cloud with The Xen Hypervisor
Scale 12x Securing Your Cloud with The Xen HypervisorScale 12x Securing Your Cloud with The Xen Hypervisor
Scale 12x Securing Your Cloud with The Xen Hypervisor
 
XPDS16: Xen Project Weather Report 2016
XPDS16: Xen Project Weather Report 2016XPDS16: Xen Project Weather Report 2016
XPDS16: Xen Project Weather Report 2016
 
Securing your Cloud with Xen - SUSECon 2013
Securing your Cloud with Xen - SUSECon 2013Securing your Cloud with Xen - SUSECon 2013
Securing your Cloud with Xen - SUSECon 2013
 
OSSEU18: From Handcraft to Unikraft: Simpler Unikernelization of Your Applica...
OSSEU18: From Handcraft to Unikraft: Simpler Unikernelization of Your Applica...OSSEU18: From Handcraft to Unikraft: Simpler Unikernelization of Your Applica...
OSSEU18: From Handcraft to Unikraft: Simpler Unikernelization of Your Applica...
 

Semelhante a Platform Security Summit 18: Xen Security Weather Report 2018

Presentation architecting a cloud infrastructure
Presentation   architecting a cloud infrastructurePresentation   architecting a cloud infrastructure
Presentation architecting a cloud infrastructure
solarisyourep
 
Ceph Day Shanghai - On the Productization Practice of Ceph
Ceph Day Shanghai - On the Productization Practice of Ceph Ceph Day Shanghai - On the Productization Practice of Ceph
Ceph Day Shanghai - On the Productization Practice of Ceph
Ceph Community
 
Windows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterpriseWindows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterprise
247infotech
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2
Srinivasa Addepalli
 

Semelhante a Platform Security Summit 18: Xen Security Weather Report 2018 (20)

OffensiveCon2022: Case Studies of Fuzzing with Xen
OffensiveCon2022: Case Studies of Fuzzing with XenOffensiveCon2022: Case Studies of Fuzzing with Xen
OffensiveCon2022: Case Studies of Fuzzing with Xen
 
Fuzzing_with_Xen.pdf
Fuzzing_with_Xen.pdfFuzzing_with_Xen.pdf
Fuzzing_with_Xen.pdf
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdf
 
Container Security - Let's see Falco and Sysdig in Action by Stefan Trimborn
Container Security - Let's see Falco and Sysdig in Action by Stefan Trimborn Container Security - Let's see Falco and Sysdig in Action by Stefan Trimborn
Container Security - Let's see Falco and Sysdig in Action by Stefan Trimborn
 
LCNA14: Why Use Xen for Large Scale Enterprise Deployments? - Konrad Rzeszute...
LCNA14: Why Use Xen for Large Scale Enterprise Deployments? - Konrad Rzeszute...LCNA14: Why Use Xen for Large Scale Enterprise Deployments? - Konrad Rzeszute...
LCNA14: Why Use Xen for Large Scale Enterprise Deployments? - Konrad Rzeszute...
 
System Device Tree and Lopper: Concrete Examples - ELC NA 2022
System Device Tree and Lopper: Concrete Examples - ELC NA 2022System Device Tree and Lopper: Concrete Examples - ELC NA 2022
System Device Tree and Lopper: Concrete Examples - ELC NA 2022
 
Considerations when implementing_ha_in_dmf
Considerations when implementing_ha_in_dmfConsiderations when implementing_ha_in_dmf
Considerations when implementing_ha_in_dmf
 
[발표자료] 오픈소스 Pacemaker 활용한 zabbix 이중화 방안(w/ Zabbix Korea Community)
[발표자료] 오픈소스 Pacemaker 활용한 zabbix 이중화 방안(w/ Zabbix Korea Community) [발표자료] 오픈소스 Pacemaker 활용한 zabbix 이중화 방안(w/ Zabbix Korea Community)
[발표자료] 오픈소스 Pacemaker 활용한 zabbix 이중화 방안(w/ Zabbix Korea Community)
 
Best Practices for Deploying Enterprise Applications on UNIX
Best Practices for Deploying Enterprise Applications on UNIXBest Practices for Deploying Enterprise Applications on UNIX
Best Practices for Deploying Enterprise Applications on UNIX
 
Larson Macaulay apt_malware_past_present_future_out_of_band_techniques
Larson Macaulay apt_malware_past_present_future_out_of_band_techniquesLarson Macaulay apt_malware_past_present_future_out_of_band_techniques
Larson Macaulay apt_malware_past_present_future_out_of_band_techniques
 
Xen revisited
Xen revisitedXen revisited
Xen revisited
 
Apache Cloudstack QA Strategy
Apache Cloudstack QA StrategyApache Cloudstack QA Strategy
Apache Cloudstack QA Strategy
 
Presentation architecting a cloud infrastructure
Presentation   architecting a cloud infrastructurePresentation   architecting a cloud infrastructure
Presentation architecting a cloud infrastructure
 
Presentation architecting a cloud infrastructure
Presentation   architecting a cloud infrastructurePresentation   architecting a cloud infrastructure
Presentation architecting a cloud infrastructure
 
Ceph Day Shanghai - On the Productization Practice of Ceph
Ceph Day Shanghai - On the Productization Practice of Ceph Ceph Day Shanghai - On the Productization Practice of Ceph
Ceph Day Shanghai - On the Productization Practice of Ceph
 
Best practices in Deploying SUSE CaaS Platform v3
Best practices in Deploying SUSE CaaS Platform v3Best practices in Deploying SUSE CaaS Platform v3
Best practices in Deploying SUSE CaaS Platform v3
 
Windows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterpriseWindows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterprise
 
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
 
System hardening - OS and Application
System hardening - OS and ApplicationSystem hardening - OS and Application
System hardening - OS and Application
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2
 

Mais de The Linux Foundation

Mais de The Linux Foundation (20)

ELC2019: Static Partitioning Made Simple
ELC2019: Static Partitioning Made SimpleELC2019: Static Partitioning Made Simple
ELC2019: Static Partitioning Made Simple
 
XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...
XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...
XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...
 
XPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, Xilinx
XPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, XilinxXPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, Xilinx
XPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, Xilinx
 
XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...
XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...
XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...
 
XPDDS19: Memories of a VM Funk - Mihai Donțu, Bitdefender
XPDDS19: Memories of a VM Funk - Mihai Donțu, BitdefenderXPDDS19: Memories of a VM Funk - Mihai Donțu, Bitdefender
XPDDS19: Memories of a VM Funk - Mihai Donțu, Bitdefender
 
XPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, Citrix
XPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, CitrixXPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, Citrix
XPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, Citrix
 
XPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltd
XPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltdXPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltd
XPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltd
 
XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...
XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...
XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...
 
XPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&D
XPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&DXPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&D
XPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&D
 
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM Systems
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM SystemsXPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM Systems
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM Systems
 
XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...
XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...
XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...
 
XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...
XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...
XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...
 
XPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSE
XPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSEXPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSE
XPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSE
 
XPDDS19: Implementing AMD MxGPU - Jonathan Farrell, Assured Information Security
XPDDS19: Implementing AMD MxGPU - Jonathan Farrell, Assured Information SecurityXPDDS19: Implementing AMD MxGPU - Jonathan Farrell, Assured Information Security
XPDDS19: Implementing AMD MxGPU - Jonathan Farrell, Assured Information Security
 
XPDDS19: Support of PV Devices in Nested Xen - Jürgen Groß, SUSE
XPDDS19: Support of PV Devices in Nested Xen - Jürgen Groß, SUSEXPDDS19: Support of PV Devices in Nested Xen - Jürgen Groß, SUSE
XPDDS19: Support of PV Devices in Nested Xen - Jürgen Groß, SUSE
 
XPDDS19: Application Agnostic High Availability Solution On Hypervisor Level ...
XPDDS19: Application Agnostic High Availability Solution On Hypervisor Level ...XPDDS19: Application Agnostic High Availability Solution On Hypervisor Level ...
XPDDS19: Application Agnostic High Availability Solution On Hypervisor Level ...
 
XPDSS19: Live-Updating Xen - Amit Shah & David Woodhouse, Amazon
XPDSS19: Live-Updating Xen - Amit Shah & David Woodhouse, AmazonXPDSS19: Live-Updating Xen - Amit Shah & David Woodhouse, Amazon
XPDSS19: Live-Updating Xen - Amit Shah & David Woodhouse, Amazon
 
XPDDS19: Xen API Archaeology: Creating a Full-Featured VMI Debugger for the...
XPDDS19:   Xen API Archaeology: Creating a Full-Featured VMI Debugger for the...XPDDS19:   Xen API Archaeology: Creating a Full-Featured VMI Debugger for the...
XPDDS19: Xen API Archaeology: Creating a Full-Featured VMI Debugger for the...
 
XPDDS19: Secure Unikraft Applications with Solo5 - Haibo Xu, ARM
XPDDS19: Secure Unikraft Applications with Solo5 - Haibo Xu, ARMXPDDS19: Secure Unikraft Applications with Solo5 - Haibo Xu, ARM
XPDDS19: Secure Unikraft Applications with Solo5 - Haibo Xu, ARM
 
XPDDS19: The Xen-Blanket for 2019 - Christopher Clark and Kelli Little, Star ...
XPDDS19: The Xen-Blanket for 2019 - Christopher Clark and Kelli Little, Star ...XPDDS19: The Xen-Blanket for 2019 - Christopher Clark and Kelli Little, Star ...
XPDDS19: The Xen-Blanket for 2019 - Christopher Clark and Kelli Little, Star ...
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Platform Security Summit 18: Xen Security Weather Report 2018

  • 1. Lars Kurth Community Manager, Xen Project Chairman, Xen Project Advisory Board lars_kurth
  • 2.
  • 3.
  • 4. Meltdown (SP3) • XPTI: Recommended mitigation • Followed by XPTI performance improvements – more to follow Spectre (SP2) • x86: By default, Xen will pick the most appropriate mitigations based on compiled in support, loaded microcode, and hardware details, and will virtualise appropriate mitigations for guests to use. – Command line controls via the spec-ctrl command line option are available – 10% net/disk performance improvements in some production scenarios – 50s boot time improvement on some servers
  • 5. Spectre (SP2) • Arm32: Mitigation for Cortex-A15, Cortex-A12, Cortex-A17 are present in Xen 4.7 and later (requires updated firmware) • Arm64: SMCCC 1.1 based mitigation for Cortex-A57, Cortex-A72, Cortex-A72, Cortex- A75 for Xen 4.10 and later. Spectre (SP1/SP4) • Attacker needs a suitable "gadget" running inside of the Hypervisor • Xen has nothing similar to eBPF and no other gadgets. Static analysis by large vendors in the community has also not yet shown anything • SP4: microcode based mitigations are available via spec_ctrl=ssbd to enable guest operating systems and applications to make use of microcode based mitigations
  • 6. Disaggregation • Desktop: OpenXT, SecureView, QubesOS • Embedded: Virtuosity (Q2-Q4 2018), Crucible • Automotive: EPAM Fusion, GlobalLogic Nautilus Virtual Machine Introspection • Server Virtualization: Bitdefender HVI, Zazen, AIS IntroVirt • Security Software: Cuckoo Sandbox, DRAKVUF Live Patching • Server Virtualization: Citrix, Oracle, Huawei • Cloud Computing: AWS, Oracle, Huawei, IBM Softlayer, Rackspace, … ~50% of pre-disclosure list These technologies are well understood by a critical mass of Xen Project upstream maintainers and committers.
  • 7. Support Status • Driver Domains: Security supported with caveats (stemming from PCI Passthrough caveats) • Device Model Stub Domains: Vulnerabilities of a device model stub domain to a hostile driver domain (either compromised or untrusted) are excluded from security support Missing upstream Pieces • Upstream Multi-Domain Build Support: OpenXT, various vendors, … do their own different things ➜ ViryaOS could be the way forward (see lists.xenproject.org/archives/html/xen-devel/2018- 05/msg01097.html) • Lack of upstream integration testing: looking for contributions or commitment to test RCs ➜ see https://lists.xenproject.org/archives/html/xen-devel/2018-05/msg00976.html • Linux stub domains: waiting for Invisible Things Labs contribution Upstream support could be better if there was more active engagement from down streams This is generally the case for security features with the exception of LP and VMI ➜ more leadership/engagement from security community needed
  • 8. Measured Boot: TPM/TXT (x86) & OP-TEE (Arm) • Desktop: OpenXT, SecureView, QubesOS (optional via Anti Evil Maid) • Embedded: Virtuosity (Q2-Q4 2018), Crucible • Automotive: EPAM Fusion – actively working on OP-TEE integration with Xen • Cloud Computing: Oracle (in progress) Not well understood by upstream maintainers and committers. XSM:FLASK • Desktop: OpenXT, SecureView • Embedded: Virtuosity, Crucible • Automotive: EPAM Fusion Not well understood by upstream maintainers and committers. There is a desire to get XSM to a point where we would like XSM to be supported and could recommend average users to enable; possibly even having it on by default.
  • 9. Disaggregation involves breaking up Dom0 into several domains • These perform actions normally reserved to Dom0 ➜ meaning more permissions are needed • XSM:FLASK is then used to relax permissions of domains that would be DomU’s Risks from the viewpoint of the Xen Project • High risk to enable XSM with a policy that makes the system less safe by allowing 'normal' domains to do things they weren't able to do before • Using XSM requires expert capability that most users will not have • Need a way of guaranteeing that XSM + the "default policy" is at least as safe as no XSM • Also see XSA-77 (Disaggregated domain management security status) Possible Solutions • A test based approach ➜ cumbersome and does not protect users modifying the policy • An approach that allows starting privileged domains and uses XSM:FLASK to restrict permissions • Not alone sufficient to become a supported feature
  • 10. Support.md xenbits.xenproject.org/docs/unstable/support-matrix.html • Formalize support and security support status for Xen Functionality • This highlighted some gaps, such as VMI, XSM, XSM:FLASK • Some partially security supported features such as Driver Domains, Device Model Stub Domains, Device Passthrough have raised concerns What is needed for Features to be (security) supported • Functional completeness, sufficient automated testing, interface stability ➜ supported – Automated testing via OSSTEST can be waived if there is a commitment by a community member to run their own automated tests on Xen RCs • In most cases this is sufficient to be security supported – But: in cases where the security team does not have the capability to fix issues, we need commitment from outside experts to work with the team under embargo in a timely fashion ➜ Example: ARINC635 scheduler
  • 11. Become a CNA • Applied to MITRE after a an informal agreement in mid 2017 • Responsibility for awarding CNA status for FOSS projects has been moved to DWF (so far unresponsive) Security Process Review • Performed analysis of Security Process with some recommendations • Available for review at: lists.xenproject.org/archives/html/xen-devel/2018-05/msg01127.html Observation • Very few Security/Embedded companies are on the pre-disclosure list despite qualifying: Only AIS, BitDefender, Invisible Things Lab are on the list • I do not understand whether there is a valid reason or this is simply an oversight
  • 12.
  • 13. Basic Idea: Remove Sensitive Data from the Hypervisor • Follow-up on Spectre/Meltdown issues to reduce the risk of data leakage • The problem: all state from all VMs is currently mapped into the hypervisor ➜ so an attacker can see secrets belonging to other VMs. • Solution: reorganise the mappings so the absolute minimum amount of data is mapped ➜ an attacker can't access data pertaining to other VMs. – Get rid of Directmap, etc. – Per domain heaps – Reduce non-relevant data that is mapped into Hypervisor context This will be a hot topic at the Xen Project Developer Summit in Nanjing, China
  • 14. Status at release of Xen 4.11 • PVH DomU (no passthrough, QEMU not required) – supported • PVH Dom0 – experimental • PVH Shim (backwards compatibility) – supported primarily because it has received significant testing and was used as Meltdown mitigation • PV / HVM code path separation: progress at around 60% through the code Future • Add PCI passthrough support for PVH DomU • Performance tuning of PVH Dom0 (hypercall performance of PVH guests compared to PV) • Complete PV / HVM code path separation – KCONFIG configuration for PV and PVH/HVM modes (CONFIG_PV and CONFIG_HVM) ➜ significant attack surface reduction • Make all relevant components supported
  • 15. Possibilities, once PVH work has been completed Today (Coverity based on standard x86 build) K SLOC Xen x86 with everything enabled 237 QEMU Upstream x86 / QEMU Traditional x86 1,005 / 125 Estimates (based on manual inspection) K SLOC x86 PVH for Intel only (no AMD) No Server features No XSM, No VMI 128 Additionally remove __init code (which get discarded once hypervisor is fully set up) and additional components which are not needed for a more static system as expected in embedded/automotive applications 110 Substantial code size and thus attack surface reduction is possible, but would require significant effort. A more comprehensive study on x86 code size would be needed.
  • 17. Items I am aware of (not a complete list) • PV drivers: input, sound & DRM (EPAM) • Xen OP-TEE support (EPAM) • Co-processor (GPU) sharing framework (EPAM) • Hard real-time support (EPAM) • Power Management & HMP (Aggios, XILINX) • Startup latency: Boot multiple VMs in parallel from Device Tree (XILINX) • RTOS Dom0 / Dom0-less system (Multiple) • Code size reduction for Safety certification (Multiple) • Inter-VM communication primitives for hypervisor mediated data exchange (BAE) • Virtual TPMs for Xen in OpenEmbedded meta-virtualization (BrainTrust)
  • 18. Full ARM 64 build with standard configuration (via make cloc) is ∼58.5K SLOC Excludes: • ACPI (not enabled in default config) • Dom0 • Key Dom0 components • Toolstack Renesas Rcar-3 Kconfig is ∼48K SLOC today. See lists.xenproject.org/archives/html/xen-devel/2018-04/msg01453.html for a patch under discussion. Potentially Feasible: A smaller Xen configuration of around 45K SLOC may be achievable, by disabling some core functionality ➜ not clear whether desirable and the effort required Cost Example: DO-178C, per 10K SLOC DAL E (0.11 h/SLOC): ∼0.6 man years … ASIL-A DAL C (0.20 h/SLOC): ∼1 man years … ASIL-B/C DAL A (0.67 h/SLOC): ∼3.3 man years … ASIL-D Hours for vendor with certification experience Based on data from Dornerworks
  • 19. Stage 2: Create shared certification artefacts under the guidance/with support from certification partner Adapt development processes, where feasible. 4 Complete MISRA compliance work for majority of issues. MISRA Compliance 1 Identify compliance partner that is willing to work with the project ➜ PRQA 2 WIP: Formalize relationship between vendor and the project 3 Iteratively address compliance issues within the Xen Project community: start with potentially controversial and high impact issues. Certification Partners 1 WIP: Identify possible certification partners and understand the framework they are willing to work with. Note: Dornerworks is a possible partner given past certification experience on Xen 2 Formalize relationship between vendor(s) and the project Dom0 RTOS (e.g. FreeRTOS) as Dom0, and/or Dom0-less stack with minimal management tools. Lead Community Members • EPAM, XILINX • Dornerworks and Star Lab as possible collaborators Minimal Xen Create minimal Kbuild for Xen as a reference, using Renesas R-Car as starting point (WIP) Lead Community Members • Stefano Stabellini • EPAM, Dornerworks, XILINX and others as collaborators Reliable data about achievable minimal code size and community challenges that need to be resolved Note: Dom0 and Minimal Xen do not need to be complete to get sufficient data
  • 20. FreeRTOS based Dom0 • Lead: EPAM • Commercial safety certified version called SafeRTOS • Baseline for a Renesas FreeRTOS build: 9 SKLOC • Would need Xenbus, Xenstore and a Toolstack (most functionality in XL is not needed) • Hardware domains (or other similar disaggregation techniques) would be needed for drivers • Working first prototype expected in Q3’2018 Dom0-less option • Lead: Stefano (Xilinx) & Praveen Kumar (Washington University) • Much less clear on how this may work, how much work it is and whether such an approach fulfils safety requirements • Could build on “Boot multiple VMs in parallel from Device Tree” ➜ clearly has disadvantages for x86 • Demonstrate that after boot Dom0 cannot affect the system anymore
  • 21. A new proposal for a sub-project: development work has started around 6 months ago to have something concrete when launching • A Flexible build system • A Secure Xen based runtime • Containers supported natively • Supports ARM and x86 • Targeted at Embedded and IoT Proposal open for discussion @ lists.xenproject.org/archives/html/xen- devel/2018-05/msg01097.html
  • 22. • A multi-domain build system • Builds multiple domains in one go • Creates a runnable SD Card image from multiple domain builds • Each domain build is independent and runs in a container • Pre-configured Device Assignments Dom0 – Alpine Linux Userspace Dom0 – Kernel Yocto Dom1 – Driver D Yocto Dom2 – Driver D Alpine apks Image .gz rootfs apks Image format generator SD Card image Build processes and interim build images are docker containers ➜ ease of integration for 3rd party build systems
  • 23. • Uses disaggregation, service domains and driver domains • Measured Boot • Supports VMs and containers • Containers are run securely, transparently as Xen VMs – Issue: port stage-1 Xen to Docker See www.slideshare.net/xen_com_mgr/xpdss17-keynote-secure- containers-with-xen-and-coreos-rkt-stefano-stabellini-aporeto Dom0 DomS Domain Manager DomU Secure Stage-1 Xen Container Containderd creates request creation (via TBD API)
  • 24.
  • 25. L4Re (GPLv2 – dual license) by KernKonzept • Microvisor with solid feature set • No public repositories (only code snapshots) • Requires CLA (Grant of © and patent license) ACRN (3-BSD license) by Intel • x86 only supporting some SKUs; no Arm support; no code separation • Seems to be mostly a copy of the Xen architecture with some differences (e.g. virtio) ➜ Fundamentally a validation of Xen • Will probably need some time before it becomes mature and complete • Code size just under 25 SKLOC Zircon/Fuchsia (BSD/MIT license) by Google • Not much information available • PATENTS file prohibits source-code modifications
  • 26.
  • 27. Supporting Development • Development contributions • Assign engineers to review design RFCs and patches on upstream mailing list (to make this easier we could add R: tags to MAINTAINERS) • Test contributions ➜ in particular for unsupported features • Documentation contributions ➜ some security functionality is not well documented • Help guide some of our larger projects / initiatives
  • 28. Funding • Advisory Board membership • Sponsoring Events and/or Interns • Donating Hardware for the Test Lab ➜ e.g. Renesas • Donate/sponsor Services ➜ e.g. Rackspace • Travel for engineers to attend community events Marketing • User stories, articles, talks at industry events, research … • The Xen Project can help, but do inform us when you do something