DaemonForums  

Go Back   DaemonForums > Miscellaneous > General software and network

General software and network General OS-independent software and network questions, X11, MTA, routing, etc.

Reply
 
Thread Tools Display Modes
  #1   (View Single Post)  
Old 22nd March 2015
Oko's Avatar
Oko Oko is offline
Rc.conf Instructor
 
Join Date: May 2008
Location: Kosovo, Serbia
Posts: 1,102
Default Virtualization maybe not such a great idea

Even the most advanced file system in existence might not save your data from buggy virtualizatin

http://lists.dragonflybsd.org/piperm...ch/207570.html
Reply With Quote
  #2   (View Single Post)  
Old 22nd March 2015
rocket357's Avatar
rocket357 rocket357 is offline
Real Name: Jonathon
Wannabe OpenBSD porter
 
Join Date: Jun 2010
Location: 127.0.0.1
Posts: 429
Default

Quote:
Originally Posted by Theo
You are absolutely deluded, if not stupid, if you think that a worldwide collection of software engineers who can't write operating systems or applications without security holes, can then turn around and suddenly write virtualization layers without security holes.
I think that about sums it up.
__________________
Linux/Network-Security Engineer by Profession. OpenBSD user by choice.
Reply With Quote
  #3   (View Single Post)  
Old 23rd March 2015
gpatrick gpatrick is offline
Spam Deminer
 
Join Date: Nov 2009
Posts: 245
Default

It should be mentioned that most uses of virtualization is for resource utilization and not security. Instead of buying 10 individual servers, 1 larger server can be purchased and "carved up" into 10 virtual machines.

Also, Mainframes have had virtual machines for decades and have been secure to my knowledge, unlike Xen, KVM, etc., but this may also be due to hardware.
Reply With Quote
  #4   (View Single Post)  
Old 23rd March 2015
J65nko J65nko is offline
Administrator
 
Join Date: May 2008
Location: Budel - the Netherlands
Posts: 4,125
Default

As far as I understand, the cause of the data corruption, is that the virtual layer "lied" about having data being written to disk, while it was not, it was only cached.

An application of or a file system layer that is being lied, coupled with a crash, can cause data loss.
For a mail server see Dan Bernstein's recommendation and explanation: http://cr.yp.to/qmail/faq/reliability.html#filesystems
__________________
You don't need to be a genius to debug a pf.conf firewall ruleset, you just need the guts to run tcpdump
Reply With Quote
  #5   (View Single Post)  
Old 23rd March 2015
jggimi's Avatar
jggimi jggimi is offline
More noise than signal
 
Join Date: May 2008
Location: USA
Posts: 7,975
Default

Quote:
Originally Posted by gpatrick View Post
... Mainframes have had virtual machines for decades...
In software, since 1972 with IBM's VM/370. In hardware since 1975 with Amdahl's Multiple Domain Facility (MDF).
Quote:
...and have been secure to my knowledge, unlike Xen, KVM, etc., but this may also be due to hardware...
Security through hardware isolation and performance improvement, were the two key selling points for MDF. IBM's competitive response in the 1980s, Logical Partitioning (LPAR), offered (and still offers) similar capabilities.
Reply With Quote
Reply

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump

Similar Threads
Thread Thread Starter Forum Replies Last Post
The Great SIM Heist - How Spies Stole the Keys to the Encryption Castle J65nko News 2 26th February 2015 09:53 PM
China censorship leaks outside Great Firewall via DNS root server J65nko News 0 25th March 2010 08:23 PM
Great programmers answer a few questions drhowarddrfine Off-Topic 19 7th May 2009 05:21 PM
The great appliance hunt. diw General Hardware 8 23rd July 2008 07:02 PM
Great Forum! I smell potenial! marcolino Feedback and Suggestions 8 7th May 2008 07:49 PM


All times are GMT. The time now is 04:31 AM.


Powered by vBulletin® Version 3.8.4
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
Content copyright © 2007-2010, the authors
Daemon image copyright ©1988, Marshall Kirk McKusick