Difference between revisions of "ASL 3.2 Virtualization Notes"

From Atomicorp Wiki
Jump to: navigation, search
(Latest kernel not supported)
m (Xen)
Line 33: Line 33:
 
== Xen ==
 
== Xen ==
  
All Features work.  Xen does not support the latest kernel security enhancements.
+
You must use the ASL xen kernels from the tortix-kernel-xen channel with Xen. During installation ensure you have selected the xen configuration option, or manually set KERNEL_CHANNEL to tortix-kernel-xen through ASL Web.
  
The latest ASL kernels, 2.6.32.60-35 and up, contain new protections against attacks on the kernel itself.  Xen does not support these enhancements.  This is a design choice of Xen, and not something we can address.  Therefore, you must use the ASL xen kernels from the tortix-kernel-xen channel. During installation ensure you have selected the xen configuration option, or manually set KERNEL_CHANNEL to tortix-kernel-xen through ASL Web.
+
=== Xen and vulnerabilities ===
  
 +
All of the kernel security enhancements in the ASL kernel do work with Xen, except for two new enhancements to the kernel.  Specifically, Xen does not support two kernel enhancements listed below, and these be reported as such in the vulnerability report.  If these vulnerabilities are too risky for your needs, then we recommend you use a different virtualization technology.
  
Specifically, Xen does not support these kernel enhancements, and will be reported as such in the vulnerability report:
+
This is a design choice of Xen, and not something we can address unfortunately.  All kernels on Xen contain at least these two weakness.  The ASL kernel, however, significantly more resistent to these attacks than any other Linux kernel on the Xen platform.  Using a non-ASL kernel with Xen will leave your system extremely vulnerable to attack.
  
 
'''KERNEXEC'''
 
'''KERNEXEC'''

Revision as of 00:13, 15 March 2013

Contents

Supported Virtualization Technologies

ASL 3.0 is designed to work with the following Virtualization technologies:

 vserver
 kvm/qemu
 lguest
 VMWare(TM)
 Xen
 Virtuozzo
 OpenVZ

This means that you can run ASL on a virtualized machines using these technologies. The following article defines the levels of feature support as follows:

  • Full Support: All ASL features will work
  • Built in Virtualization: All ASL features will work, plus ASL can act as a virtualization host.
  • Supported and works with: All ASL features will work, except for features in the ASL kernel. These technologies either do not allow the replacement of the kernel (VPS) or do not work with the ASL kernel (Xen). You can not install or use the ASL kernel with these technologies.
  • Beta Support: All ASL features should work, however this should be consider a beta. These features are in testing, and following testing will be rolled into the supported builds.

Full Support

All Features work.

ASL has full support for the following virtualization technologies:

 vserver
 kvm/qemu
 lguest
 VMWare(TM)

You can install ASL and the ASL kernel inside virtualized guests using these technologies, and all the features will work.

Xen

You must use the ASL xen kernels from the tortix-kernel-xen channel with Xen. During installation ensure you have selected the xen configuration option, or manually set KERNEL_CHANNEL to tortix-kernel-xen through ASL Web.

Xen and vulnerabilities

All of the kernel security enhancements in the ASL kernel do work with Xen, except for two new enhancements to the kernel. Specifically, Xen does not support two kernel enhancements listed below, and these be reported as such in the vulnerability report. If these vulnerabilities are too risky for your needs, then we recommend you use a different virtualization technology.

This is a design choice of Xen, and not something we can address unfortunately. All kernels on Xen contain at least these two weakness. The ASL kernel, however, significantly more resistent to these attacks than any other Linux kernel on the Xen platform. Using a non-ASL kernel with Xen will leave your system extremely vulnerable to attack.

KERNEXEC

KERNEXEC is the kernel land equivalent of PAGEEXEC and MPROTECT, that is, this enhancement makes it harder for an attacker to inject and execute "foreign" code in kernel memory itself. Xen does not support this enhancement, although other virtualization technologies do support these enhancements (e.g. kvm, VMWare). This is a limitation of Xen, not of the ASL kernel. This enhancement is simply not possibly with Xen.

UDEREF

This ensures that userland and kernel address spaces are properly separated. This addresses NULL dereference based exploits, for example. This feature makes sure that data segments for userland and the kernel are properly limited, either upwards (userland) or downwards (kernel). Xen does not support this enhancements, although other virtualization technologies do support these enhancements (e.g. kvm, VMWare). This is a limitation of Xen, not of the ASL kernel. This enhancement is simply not possibly with Xen.

Additional information about UDEREF is provided here.

Built in Virtualization

All ASL Features work. You can also use ASL to create virtual machines using these technologies.

 vserver
 kvm/qemu
 lguest

This means you can use ASL for your virtualization needs if you use the above virtualization technologies for your virtual machines.

You can install ASL and the ASL kernel inside virtualized guests using these technologies.

Kernel-less environments

All ASL features work, however these technologies do not allow the installation of a kernel as a guest.

Therefore, you can not install the ASL kernel inside one of these virtual servers, as these technologies do not allow the installation of any kernel inside a VPS. Specifically, these technologies do not have kernels inside the VPS itself and instead, virtual machines/servers share one kernel provided by the host:

 Virtuozzo
 OpenVZ

On these systems you should expect ASL to report various vulnerabilities in the kernel. VPS users share one kernel, the hosts kernel. If the host has not installed ASL on the host system you will see vulnerabilities in the kernel. These are not false positives but are in fact vulnerabilities in those kernels. When using a virtualized machine with these technologies various other behaviours will occur, and they are covered in the article ASL#ASL_inside_a_VPS.

We recommend you encourage your hosting provider to install ASL on the host system too.

In Development

  • Xen Server: We are currently exploring support for native Xen support in the ASL kernel, where the ASL kernel will act as the Xen server. ASL is supported as a guest inside a Xen master server.
Personal tools