On 08/25/2017 12:41 PM, Martin Kletzander wrote:
On Fri, Aug 25, 2017 at 10:29:03AM +0000, Zhangbo (Oscar) wrote:
>>
>> Host can read all of the guest's memory or mount the image and modify
>> the guest agent. Or even add their own communication program that can
>> do anything.
>>
>
> I get your point now! :) Thanks a lot!!
>
> Further more, kvm seems not as secure as xen, because xen isolates
> dom0 and domU well,
> The administrator on dom0 couldn't access many things belonged to domUs.
> How to solve such problem in kvm? Any scheme?
I don't know xen much, but maybe AMD SEV or everything-signed-by TPM
would help...
I'm no HW guy, but SEV looks like protection against physical attacks,
i.e. a guy working for some government agency walking around your server
room with a load of liquid gas. At first Intel's SGX [1] looked
promising, but apparently it's flawed. So currently I don't think
there's anything we can do. Except not give out root access to everyone.
Michal
1:
https://en.wikipedia.org/wiki/Software_Guard_Extensions