[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20081215235253.GB24579@ioremap.net>
Date: Tue, 16 Dec 2008 02:52:53 +0300
From: Evgeniy Polyakov <zbr@...emap.net>
To: Anthony Liguori <anthony@...emonkey.ws>
Cc: Jeremy Fitzhardinge <jeremy@...p.org>, netdev@...r.kernel.org,
David Miller <davem@...emloft.net>, kvm@...r.kernel.org,
virtualization@...ts.linux-foundation.org
Subject: Re: [PATCH] AF_VMCHANNEL address family for guest<->host communication.
On Mon, Dec 15, 2008 at 05:08:29PM -0600, Anthony Liguori (anthony@...emonkey.ws) wrote:
> The KVM model is that a guest is a process. Any IO operations original
> from the process (QEMU). The advantage to this is that you get very
> good security because you can use things like SELinux and simply treat
> the QEMU process as you would the guest. In fact, in general, I think
> we want to assume that QEMU is guest code from a security perspective.
>
> By passing up the network traffic to the host kernel, we now face a
> problem when we try to get the data back. We could setup a tun device
> to send traffic to the kernel but then the rest of the system can see
> that traffic too. If that traffic is sensitive, it's potentially unsafe.
You can even use unix sockets in this case, and each socket will be
named as virtio channels names. IIRC tun/tap devices can be virtualizen
with recent kernels, which also solves all problems of shared access.
There are plenty of ways to implement this kind of functionality instead
of developing some new protocol, which is effectively a duplication of
what already exists in the kernel.
--
Evgeniy Polyakov
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists