[libvirt-users] Direct Kernel Boot and Security

procmem procmem at riseup.net
Sun Jun 24 21:19:06 UTC 2018


Hi. What are the security implications for the host when using direct
kernel boot for guests that are potentially malicious? Is guest
filesystem data saved to an emulated drive or directly on the host? [0]
Direct boot seems like an otherwise more efficient way to do things.

[0] It was discovered that tenants using cloud infrastructure that used
LVM were able to recover deleted sensitive data from others however
emulated drives control the data available to the guest at a very low
level and consequently don't suffer from this huge disadvantage.




More information about the libvirt-users mailing list