Professional Documents
Culture Documents
Secure Virtualization With SElinux
Secure Virtualization With SElinux
Image (c) HTS Systems [picasaweb.google.com/HandTruckSentrySystem]. Reused under the terms of Creative Commons Attribution-
Secure Virtualisation
A
s the usage of virtualisation Before virtualisation, servers were generally
increases, the security that isolated physically isolated from each other (Figure
physical machines enjoy is at risk. 1). An attacker taking over one server would
Rogue processes in a guest OS might typically have control over just that. So, if
break out of the virtual machine and get access he wanted to breach the other machines on
to the host memory or other guests. Designing the network, he essentially had to launch a
security features within hypervisors can control network-based attack to exploit them. This
this. But in case of such incidents, the risks can limited the damage of network attacks. To
be mitigated by integrating Mandatory Access avoid these kinds of attacks, administrators
Controls (MAC) with virtualisation. used different tools like network firewalls,
With the integration of MAC-capable intrusion detection/prevention systems,
security schemes like SELinux, with and unified threat management systems to
virtualisation, the security position of guest mitigate the risks.
machines can be improved. With the advent of virtualisation, several
Let's take a look at how the scenario might guest machines run on the same single host
unfold. We can begin by examining the situation server (Figure 2), and probably as the same
as it existed in the good old days when one UID. This comes with its own risks. If an
physical machine ran a dedicated server: attacker gains access to a single virtual
Understanding sVirt
sVirt was introduced as a feature of Fedora 11, and conceived
as a security mechanism for Linux-based virtualisation
schemes like the (KVM)/Qemu, and lguest. It has been
developed primarily by Dan Walsh and James Morris, of Red
Hat. Some of the goals/use-cases of sVirt are listed below:
Providing virtualised services with a level of isolation
Figure 1: Server set-ups in the absence of virtualisation
similar to that previously afforded by physical separation.
Increased protection of the host from untrustworthy VM
guests (for example, for VM hosting providers, grid/cloud
servers, etc).
Increased protection of VM guests from each other in the
event of host flaws or misconfiguration. Some protection
may also be provided against a compromised host.
Strongly isolating desktop applications by running them
in separately labelled VMs (for example, online banking
in one VM and World of Warcraft in another; opening
untrustworthy office documents in an isolated VM for
view/print only).