Nuffnang

Sunday, February 26, 2012

vSphere 5 offers essential features missing from RHEV3

Feature

VMware

RHEV

Advanced Storage

Integration & Management:

Shared storage QoS

Live storage migration

Storage load balancing

Intelligent placement

Integration APIs

Storage I/O Control

Storage vMotion

Storage DRS

Profile-driven Storage

Over 150 arrays with VAAI

No

No

No

No

No

Continuous availability

VMware FT

No

AgentlessVM backup and recovery with deduplication

VMware Data Recovery

No

Virtualization-aware security

vShield product family

No

Virtualization planning and management tools

ConfigMgr, CapacityIQ, Chargeback, Converter

No

Thursday, February 23, 2012

New Virtualization System-Specific Attacks

■ VM jumping/guest hopping

–Attackers take advantage of hypervisor escape vulnerabilities to “jump” from one VM to another

■ VM attacks

–Attacks during deployment and duplication

–Deletion of virtual images

–Attacks on control of virtual machines

–Code/file injection into virtualization file structure

■ VM migration

–VM migration is transfer of guest OS from one physical server to another with little or no downtime

– Implemented by several virtualization products

–Provides high availability and dynamic load balancing



VM migration attack

– If migration protocol is unencrypted, susceptible to man-in-the-middle attack

–Allows arbitrary state in VM to be modified

– In default configuration, Xen Motion is susceptible (no encryption)

–VMware’s VMotion system supports encryption

–Proof-of-concept developed by John Oberheide at the Univ. of Michigan


Management server attacks

–Exploit management console vulnerabilities that divulge password information

–Exploit management console vulnerabilities to gain access to management server

–Exploit vulnerabilities that allow local management server users to gain elevated privileges

Administrative VM attacks – exploit vulnerabilities to:

–Cause a denial of service by halting the system

–Cause a denial of service by crashing the administrative VM

–Obtain passwords that are stored in clear text

–Exploit buffer overflows in exposed services to execute arbitrary code

–Exploit vulnerable services to gain elevated privileges

–Bypass authentication

Guest VM attacks – exploit vulnerabilities to:

–Gain elevated privileges

–Crash the virtual machine

–Truncate arbitrary files on the system

–Execute arbitrary code with elevated privileges

Hypervisor attacks – exploit vulnerabilities to:

–Cause the hypervisor to crash

–Escape from one guest VM to another

Hyperjacking

–Consists of installing a rogue hypervisor

• One method for doing this is overwriting page files on disk that contain paged-out kernel code

• Force kernel to be paged out by allocating large amounts of memory

• Find unused driver in page file and replace its dispatch function with shell code

• Take action to cause driver to be executed

• Shell code downloads the rest of the malware

• Host OS is migrated to run in a virtual machine

–Has been demonstrated for taking control of Host OS

–Hyper jacking of hypervisors may be possible, but not yet demonstrated

• Hypervisors will come under intense scrutiny because they are such attractive targets

–Known hyper jacking tools: BluePill, SubVirt, Vitrio