SlideShare ist ein Scribd-Unternehmen logo
1 von 38
Downloaden Sie, um offline zu lesen
OpenXT Project in 2016
Christopher Clark
BAE Systems
Xen Developer Summit, 25-26th
August, 2016
Presenter: Christopher Clark
Xen affiliations:
Projects:
Roles:
● BAE Systems and the OpenXT Project - since January 2016.
● { non-Xen engineering work, 4 years }
● Citrix Systems
● XenSource Inc.
● Intel Corporation
● Cambridge University Computer Laboratory
OpenXT - XenClient XT - XenClient - XenServer - Xen hypervisor
● Interoperability Architect
● Release Manager
● Principal Engineer
● Graduate Student
Focus of work in 2016: Governance for the OpenXT Project ; Security review of OpenXT software.
Outline
● Introduction to OpenXT
● Distinguishing aspects of OpenXT
● Current activity within the OpenXT Project
○ Recent developments
○ Work in progress
○ Roadmap items
OpenXT : motivation*
● Advance progress towards more secure computing
through a modern, practical, open system architecture
● Provide a common platform of software to build upon,
prioritizing extensibility, adaptable to diverse use cases,
to promote collaboration and sharing of common components
● Support building usable systems that are robust to partial compromise
*Note: these are the opinion of the presenter
OpenXT nutshell
● Core technology : Virtualization. Xen.
● Toolkit : full software stack for a virtualized system
○ OpenEmbedded toolchain, Linux kernels, VM filesystems, toolstack, … . “Batteries included.”
○ Extensible, configurable for diverse use cases and commercial derived products.
○ Supports Service VMs and APIs.
● Security : primary criteria in architecture decisions
○ Design enables strong assurances rooted in hardware.
○ Community has expertise.
● Open Source : OSI-approved licenses, open development
● Client capable : validated support for desktop, laptop hardware and devices
What distinguishes OpenXT?
● Security focus of the system architecture and technology selection
● Community
○ Depth of expertise in critical technologies, diversity of experience, direction of focus.
○ Members involved in development of platform security technologies across industry.
● Client use cases supported
● Open Source, OpenEmbedded build and toolchain
○ Participation in upstream communities and commitment to support downstream projects.
● Validated integration
○ An integrated system of many complex software components.
○ Derivative products have been successfully Certified and deployed.
Build Product
A current build of OpenXT software today will produce a bootable ISO to run an installer.
Install provisions the Xen hypervisor and a collection of helper VMs running Linux to provide
a hardened desktop environment
for running Windows or Linux desktop workloads.
It provides guest tools with paravirtualized device drivers to install within the guest VMs.
Extensibility of this system:
● At software compile and build time: customizable via OpenEmbedded Layers.
● At deployment time: API support for third-party Service VMs.
Platform Properties of OpenXT
Our community has consensus that these properties of the software are important to us:
● Integrity of operating software assured via measured launch and hardware-rooted
enforcement of isolation between components.
● Protection of storage, confidentiality and integrity of system configuration and user data.
● Protection of communications, with isolation between network device control software,
encryption software with network credentials, and user software.
● Protection of concurrent user software execution environments.
● Protection of user input via local keyboard, mouse and touchscreen devices.
● Protection of graphical output, with support for high-performance 3D desktops.
● Policy-based assignment and confinement of hardware peripherals.
● Compatibility with modern computer hardware and contemporary operating systems.
● Architected and licensed to support commercial derivative software.
A maintained list of platform properties is at: https://openxt.atlassian.net/wiki/display/CS/Gov2%3A+OpenXT+Platform+Properties+and+Layers
Architecture aspects / Technologies
● OpenEmbedded ecosystem provides toolchain and software platform
● The OpenXT Project is a strong proponent of disaggregation and isolation
○ Provides a distributed network stack with VTd-enforced isolation
● Measured Launch : using Intel TXT, tboot, TPM 1.2, trousers
● Read-only root filesystems with reset upon power operations
● Linux-based stub-domains to encapsulate Qemu instances
● Xen Security Modules enabled and enforcing
● SELinux enabled and enforcing with a tailored policy in Dom0 and NDVM
● Blktap2 storage path, soon to be blktap3
● Modern PV-USB stack with Windows and Linux guest support
● Specialized human interface device input layer
OpenEmbedded
A mature Open Source, collaborative, distributed, software packaging project and toolchain.
● OpenEmbedded delivers many software packages.
○ Toolkit for assembling an entirely customized Linux distribution.
● We use it to assemble multiple customized Linux distributions to build OpenXT
○ Domain 0
○ Stubdomains
○ The OpenXT Installer
○ NDVM
○ UIVM
○ SyncVM
○ ...
OpenEmbedded
OpenEmbedded delivers many software packages.
● Each package is described in a Recipe.
○ Recipes declare package version, source URL, license, build steps, customizations, etc.
● Collections of recipes are maintained in Layers.
○ Software within a layer is maintained together to ensure compatibility between packages.
○ A layer is a git repository with a curated collection of recipe files with community governance.
OpenEmbedded
● Downstream layers can override or extend recipes of upstream layers to apply
customizations, if needed.
● Downstream layers benefit from upstream layers component maintainership.
Maximizes community collaboration on shared common components.
● OpenXT provides its own Layer.
○ In near future, it will be multiple layers - we are clustering our components into separate layers.
○ When you work on OpenXT, you work with git repos containing recipes or source code of components that
recipes compile and package.
● OpenEmbedded is one of several projects “upstream” to OpenXT.
We work to integrate our changes into the highest layer appropriate.
OpenEmbedded Layers in OpenXT
Layers in OpenXT:
● openembedded-core
● meta-openembedded*1
: meta-xfce, meta-oe, meta-gnome, meta-networking, meta-python
● meta-java
● meta-selinux
● meta-intel
● coming soon: meta-virtualization
● xenclient-oe*2
Other layers of interest:
● meta-security-isafw
● meta-measured
● meta-servicevm
*1
meta-openembedded actually provides multiple layers, rather than just one *2
“xenclient-oe” should be renamed and separated into “meta-openxt-*” layers
Xen hypervisor and Qemu device emulator
Numerous modifications vs Upstream Xen + Qemu. Motivated by our secure client use cases.
● Xen Security Modules (XSM): Enabled and Enforcing.
● Suspend, hibernate and power management changes.
● v4v interdomain communication protocol + firewall.
● Modifications to blktap2 storage support for encryption and disk transfers - blktap3 work due to commence soon.
● Cosmetic fixes to correctly display Windows boot graphics.
● ACPI and SMBIOS support for laptop vendor customizations - now upstream and undergoing further development.
● Hardware quirk fixes.
● Setting cache attributes on mapped memory for video support.
The delta vs upstream is decreasing.
Upstream capabilities improve with our involvement and former XenClient features are removed from OpenXT.
Current migration work towards to newer hypervisor versions is reducing our patch queue.
Distributed network architecture
A key distinguishing feature of the OpenXT system
Default configuration: All of the physical PCI network devices are assigned to
a single Network Device Virtual Machine (NDVM) and isolated using VTd.
NIC
device
driver
NIC
device
driver
Wi-Fi
device
driver
Bridging & Routing
Netback
Network Manager
Network
Manager
User
Interface
Windows
PV netfront
Linux
PV netfront
Dom0 UIVM NDVM
Toolstack
Windows
Desktop
Linux
Desktop
Xen
Distributed network architecture
A key distinguishing feature of the OpenXT system architecture.
Default configuration: All of the physical PCI network devices are assigned to a single Network Device
Virtual Machine (NDVM) and isolated using VTd.
The NDVM contains all the network device drivers.
Exports access to the networks via virtual interfaces into the guest VMs.
Bridging or routing guest networks and physical networks happens in the NDVM.
Dom0 is not part of the guest networking datapath.
User control of networks is via the Network Manager applet in the User Interface VM.
This connects to the network-manager daemon via dbus proxied over v4v.
Architecture isolates network device drivers from all VMs and dom0.
A compromised network device driver only compromises the NDVM and not the rest of the system.
Network architecture
Alternative configuration
OpenXT also supports running multiple NDVMs: one per Network Interface Card.
Configuration instructions are in the project documentation.
This stronger configuration enables VTd-enforced isolation between physical networks.
It costs additional resources (RAM, CPU) to run additional NDVMs, and can alter maximum throughput and packet
latency across networks but it enables insertion of protected middlebox VMs into the cross-network path.
Network architecture
The OpenXT platform supports development of "NILF-VM"s: Network Interface Layer Function VMs.
This is to support third-party networking software integration.
eg: a VPN interposition NILF-VM.
A VM that provides encapsulation of all network traffic via a VPN,
interposing in-between a guest Windows VM and the NDVM assigned to the physical device NIC.
This isolates VPN credentials from both the guest Windows software and the network device driver.
The unencrypted traffic data is never accessible by the NIC hardware or the network device driver.
Demonstrates Xen’s strength, the advantage provided by a type-1 hypervisor.
Measured Launch
Core concept:
A sequence of software measurements is taken during system boot, with each
component measured prior to launching it, and the measurements securely stored
in the hardware Trusted Platform Module.
Measurements are then used to unlock encryption keys that grant access to system
configuration and user data, providing confidentiality and constraining access to
only when the trusted system software is running.
Measured Launch
● Implementation built upon hardware platform primitives: Intel TXT and a TPM device.
● Measurements include: Xen binary, Dom0 kernel, kernel command lines, Dom0 initrd, Dom0 rootfs,
tboot, microcode, Intel ACMs, and XSM policy.
● Uses grub version 2, with a fixed, measured grub command line. Interactive grub prompt is disabled.
The measurements of all components must be correct to acquire the decryption key to unlock access to
the host platform configuration data stored on disk and the keys to the disk images of guest VMs.
Notable components:
● Tboot is the Xen launch verifier for TXT.
● TrouSerS, TCG Software Stack. User space software that drives the TPM via a Dom0 kernel device.
● Disk encryption is performed with LUKS. AES-NI accelerates encryption and decryption data paths.
Measured Launch
Recent changes to OpenXT’s Measured Launch:
● LUKS configuration changes to replace a RSA-key wrapped password to an
admin supplied password
● Removal of some platform reboots during install for secret sealing
● Preparatory work towards future support for remote attestation
Linux-based Stub-domains
● Motivation: Hardening. Move the large qemu attack surface outside dom0.
○ Has successfully mitigated a number of Xen Security Advisory defects.
○ Acknowledgement: support for disaggregation adds complexity to the hypervisor and tools.
● Limited, read-only root filesystem
● Stateless across domain restarts
● Reduced Linux kernel configuration
Access Control
● Xen Security Modules : Enabled and Enforcing
○ Mandatory Access Control within the hypervisor, with the Flask architecture
○ Access control points throughout the hypervisor
○ Governed by a policy loaded at boot
● SELinux : Enabled and Enforcing in Dom0 and NDVM
○ Using a tailored policy for confinement
OpenXT PV-USB
● Originally from Virtual Computer’s NXtop, Citrix’s XenClient Enterprise product
○ A production-quality Windows front-end and Linux back-end. Open Source.
○ USB 2.0.
● Linux front-end developed in OpenXT
○ by AIS’s Open Source team. Validated and used in production.
● Orchestrated by a USB control daemon in dom0, also developed in OpenXT
○ Standalone software, primarily interfaces to udev and, to a lesser extent, libUSB.
○ Handles udev events for new devices according to device or device-class policy.
○ Writes XenStore entries to establish connections between the PV-USB front and backends.
OpenXT PV-USB
● Uses a novel two-layer “indirect grant refs” ring structure for efficiency
○ Enables bulk transfer of many grant-refs per ring transaction.
● Upstream-suitable : interest or assistance is very welcome
○ OpenXT is adopting other upstream Xen PV drivers and porting PV-USB to upstream xenbus
OpenXT PV-USB software references
Windows front-end driver code:
https://github.com/OpenXT/xc-vusb
https://github.com/OpenXT/xc-windows
Linux front-end driver code:
https://github.com/OpenXT/pv-linux-drivers/tree/master/xc-vusb
Linux back-end driver code:
Takes control of the assigned USB device’s configurations and interfaces.
https://github.com/OpenXT/xenclient-oe/blob/master/recipes-kernel/linux/4.4/patches/usbback-base.patch
USB policy control daemon, runs in the privileged USB control domain, ie. dom0:
Controls USB policy, assignment and management. Monitors udev events, applies policy to the types of devices it sees and
assigns devices to VMs by writing XenStore nodes to trigger front-back driver pair to initiate standard xenbus handshake.
https://openxt.atlassian.net/wiki/display/OD/vUSB+Daemon
https://github.com/OpenXT/vusb-daemon
Secure Keyboard and Mouse Input
An essential component for client virtualization. The input server runs in Dom0.
● Monitors udev for new input devices
○ Claims HID devices: keyboard, mouse, touchpad, touchscreen
● Demultiplexes input events
● Directs input events to the intended recipient VM
○ Including the UIVM, showing the local console UI
○ Prevents input snooping by other VMs
○ Enforces platform screen lock
○ Performs secure password capture for Dom0 : UIVM cannot snoop.
● Scales mouse movement for guest VMs running at different resolutions
v4v : an interdomain communication transport
● An OpenXT technology, originally developed for XenClient.
● Hypervisor-mediated data copies via private ring buffers with notifications.
● Used by OpenXT and in production in its derivative products,
plus a variant in use at Bromium.
● Has benefitted from previous reviews by the Xen Community.
v4v : an interdomain communication transport
Motivations for v4v versus any other interdomain communication mechanism:
● Strong isolation between communicating domains
○ No memory is shared between VMs
● Strong enforcement of policy controls on VM communication
○ A firewall within the hypervisor enforces rules that are set externally
● High performance suitable for sustained throughput
● A clean mapping to Linux and Windows native I/O primitives
● Clear separation from guest Operating System networking stacks
● A foundation for the future work that we intend to do
v4v : an interdomain communication transport
Known limitations:
● Current implementation has exposure to resource exhaustion
○ To be remedied with consumption constraints
○ DoS and scalability support were lesser concerns for the original client use cases.
● v4vtables firewall is a basic implementation
○ A new firewall is proposed to replace or extend v4vtables with XSM/Flask and support for in-guest SELinux
● Linux driver software requires improvement
● libvchan bindings have been requested
● Documentation is required
○ v4v comparison with other interdomain communication technologies
○ Hypervisor hypercall interface, Linux and Windows v4v driver interface and user-space library interface
○ Mechanisms to constrain v4v: XSM and the v4vtables-successor
v4v : an interdomain communication transport
Strong isolation avoids these concerns that affect inter-VM shared-memory technologies:
Impact on protocol integrity
● Peer domains can directly tamper with control structures in the shared memory region.
Impact on peer authentication
● Cannot directly know which principal wrote the protocol payload into memory to authenticate sender.
Impact on confidentiality
● Data may intentionally or accidentally leak through parts of shared memory not in use by the protocol.
● Page ownership may be intentionally or accidentally shared with additional domains, allowing observation of
data intended for one receiver.
Cost of extra assurance dependencies
● Protocol connection via XenStore forces XenStore into the TCB for communicating components.
v4v : an interdomain communication transport
Upcoming work:
● New firewall using XSM/Flask architecture
○ Work towards a unified access control architecture in OpenXT
with clear policy representation, better tooling, fewer opportunities for gaps or error
○ XSM/Flask to enforce Mandatory Access Control over v4v connections between domains
○ v4vtables may be extended to enable guests to express self-protection rules
○ SELinux to control v4v bind, send operations by individual processes
○ Add support for obtaining Flask peer labels for v4v, as per event channels
○ Convey SELinux security context across domain boundaries for access checks at recipient
● Address the known limitations described in the earlier slide.
We continue to be interested in engaging upstream Xen with v4v.
Recent Developments
● OpenXT Summit : June 2016, Washington, D.C.
○ 48 attendees from 24 organizations
○ Two days of presentations and moderated discussions on ecosystem topics
● Version 6.0 of OpenXT software release
○ Update the core distribution to OpenEmbedded Jethro release
○ Skylake hardware platform support
○ Xen hypervisor upgrade to 4.3.4 - Xen 4.6.1 is now in our master branch; work on 4.7 is next
○ Linux kernel upgrade to 4.4.16 - OpenXT 6.0.x point releases will track 4.4.x kernel updates
○ Qemu build configuration security hardened
○ Codebase security review. Package updates and selective patch inclusion for security fixes
○ Containerized build system, improved ease of use
● Project Governance
○ Project charter documents and codifying project processes
Work in Progress
Major focus is on accelerated tracking and engagement with upstream projects.
● Restructuring OpenXT into distinct OpenEmbedded Layers
○ Simplifies work for derivative projects to choose just the components they need
○ Optionality addresses the tension between feature addition vs. increase in attack surface
● Reducing specialized components of the OpenXT software
○ Adopting versions present in upstream OpenEmbedded layers
○ Working with upstream layers to add capabilities we need, assist with maintenance
○ Shrinking OpenXT Project codebase to just that which is unique to OpenXT requirements
● Xen hypervisor upgrade
○ 4.6.1 has just been successfully tested and merged into master development branch
○ 4.7.x will be immediate next target
Work in Progress
● Toolstack refactoring
○ Port to introduce libxl into the OpenXT Haskell toolstack running outside dom0
● v4v improvement
○ Please come and talk to community members about this
● Measured Launch enhancements
○ Towards forward-sealing across software upgrades
● Adopting upstream Windows PV-drivers
○ For network and block devices, to use in addition to our PV drivers for other devices
● Alternative graphics display architecture
○ Developed on an OpenXT-derivative platform
○ Please see the AIS presentation at this Xen Developer Summit
Roadmap items
● Community members have plans to integrate Xen’s vTPM and vTPM manager
into OpenXT in the near future.
● OpenXT community intends to adopt and maintain blktap3, working with the
XenServer team to assist support of their existing customer requirements.
● Make tboot into a UEFI module.
Where we work on OpenXT
● Public mailing list : openxt@googlegroups.com
● IRC #OpenXT on freenode
● Monthly community telephone call, open to all
● Confluence public wiki
● JIRA issue tracker on Atlassian cloud
● Presence in upstream projects: OpenEmbedded, Xen, Linux TPM tools, ...
You are welcome to join us!
openxt.org
EOF
Thank-you for your attention.
Thanks to the members of the OpenXT community for the work described here
and material supporting this presentation.
-xtopher
Copyright (c) 2016 BAE Systems, Inc.
Created by Christopher Clark.
This work is licensed under the Creative Commons Attribution 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/.
openxt.org

Weitere ähnliche Inhalte

Was ist angesagt?

Rootlinux17: An introduction to Xen Project Virtualisation
Rootlinux17:  An introduction to Xen Project VirtualisationRootlinux17:  An introduction to Xen Project Virtualisation
Rootlinux17: An introduction to Xen Project VirtualisationThe Linux Foundation
 
XPDS16: Xen Orchestra: building a Cloud on top of Xen - Olivier Lambert & Jul...
XPDS16: Xen Orchestra: building a Cloud on top of Xen - Olivier Lambert & Jul...XPDS16: Xen Orchestra: building a Cloud on top of Xen - Olivier Lambert & Jul...
XPDS16: Xen Orchestra: building a Cloud on top of Xen - Olivier Lambert & Jul...The Linux Foundation
 
XPDS16: Hypervisor-based Security: Vicarious Learning via Introspektioneerin...
XPDS16:  Hypervisor-based Security: Vicarious Learning via Introspektioneerin...XPDS16:  Hypervisor-based Security: Vicarious Learning via Introspektioneerin...
XPDS16: Hypervisor-based Security: Vicarious Learning via Introspektioneerin...The Linux Foundation
 
XPDS14 - Xen on ARM: Status and Performance - Stefano Stabellini, Citrix
XPDS14 - Xen on ARM: Status and Performance - Stefano Stabellini, CitrixXPDS14 - Xen on ARM: Status and Performance - Stefano Stabellini, Citrix
XPDS14 - Xen on ARM: Status and Performance - Stefano Stabellini, CitrixThe Linux Foundation
 
XPDS16: CPUID handling for guests - Andrew Cooper, Citrix
XPDS16:  CPUID handling for guests - Andrew Cooper, CitrixXPDS16:  CPUID handling for guests - Andrew Cooper, Citrix
XPDS16: CPUID handling for guests - Andrew Cooper, CitrixThe Linux Foundation
 
LFNW2014 Advanced Security Features of Xen Project Hypervisor
LFNW2014 Advanced Security Features of Xen Project HypervisorLFNW2014 Advanced Security Features of Xen Project Hypervisor
LFNW2014 Advanced Security Features of Xen Project HypervisorThe Linux Foundation
 
LCNA14: Why Use Xen for Large Scale Enterprise Deployments? - Konrad Rzeszute...
LCNA14: Why Use Xen for Large Scale Enterprise Deployments? - Konrad Rzeszute...LCNA14: Why Use Xen for Large Scale Enterprise Deployments? - Konrad Rzeszute...
LCNA14: Why Use Xen for Large Scale Enterprise Deployments? - Konrad Rzeszute...The Linux Foundation
 
ELC21: VM-to-VM Communication Mechanisms for Embedded
ELC21: VM-to-VM Communication Mechanisms for EmbeddedELC21: VM-to-VM Communication Mechanisms for Embedded
ELC21: VM-to-VM Communication Mechanisms for EmbeddedStefano Stabellini
 
Scale 12x Securing Your Cloud with The Xen Hypervisor
Scale 12x Securing Your Cloud with The Xen HypervisorScale 12x Securing Your Cloud with The Xen Hypervisor
Scale 12x Securing Your Cloud with The Xen HypervisorThe Linux Foundation
 
Xen and the art of embedded virtualization (ELC 2017)
Xen and the art of embedded virtualization (ELC 2017)Xen and the art of embedded virtualization (ELC 2017)
Xen and the art of embedded virtualization (ELC 2017)Stefano Stabellini
 
XPDS14 - Zero-Footprint Guest Memory Introspection from Xen - Mihai Dontu, Bi...
XPDS14 - Zero-Footprint Guest Memory Introspection from Xen - Mihai Dontu, Bi...XPDS14 - Zero-Footprint Guest Memory Introspection from Xen - Mihai Dontu, Bi...
XPDS14 - Zero-Footprint Guest Memory Introspection from Xen - Mihai Dontu, Bi...The Linux Foundation
 
QEMU Disk IO Which performs Better: Native or threads?
QEMU Disk IO Which performs Better: Native or threads?QEMU Disk IO Which performs Better: Native or threads?
QEMU Disk IO Which performs Better: Native or threads?Pradeep Kumar
 
Virtunoid: Breaking out of KVM
Virtunoid: Breaking out of KVMVirtunoid: Breaking out of KVM
Virtunoid: Breaking out of KVMNelson Elhage
 
Xen and Client Virtualization: the case of XenClient XT
Xen and Client Virtualization: the case of XenClient XTXen and Client Virtualization: the case of XenClient XT
Xen and Client Virtualization: the case of XenClient XTThe Linux Foundation
 
XPDS16: Xen Scalability Analysis - Weidong Han, Zhichao Huang & Wei Yang, Huawei
XPDS16: Xen Scalability Analysis - Weidong Han, Zhichao Huang & Wei Yang, HuaweiXPDS16: Xen Scalability Analysis - Weidong Han, Zhichao Huang & Wei Yang, Huawei
XPDS16: Xen Scalability Analysis - Weidong Han, Zhichao Huang & Wei Yang, HuaweiThe Linux Foundation
 
ALSF13: Xen on ARM - Virtualization for the Automotive Industry - Stefano Sta...
ALSF13: Xen on ARM - Virtualization for the Automotive Industry - Stefano Sta...ALSF13: Xen on ARM - Virtualization for the Automotive Industry - Stefano Sta...
ALSF13: Xen on ARM - Virtualization for the Automotive Industry - Stefano Sta...The Linux Foundation
 
RunX: deploy real-time OSes as containers at the edge
RunX: deploy real-time OSes as containers at the edgeRunX: deploy real-time OSes as containers at the edge
RunX: deploy real-time OSes as containers at the edgeStefano Stabellini
 

Was ist angesagt? (20)

Rootlinux17: An introduction to Xen Project Virtualisation
Rootlinux17:  An introduction to Xen Project VirtualisationRootlinux17:  An introduction to Xen Project Virtualisation
Rootlinux17: An introduction to Xen Project Virtualisation
 
XPDS16: Xen Orchestra: building a Cloud on top of Xen - Olivier Lambert & Jul...
XPDS16: Xen Orchestra: building a Cloud on top of Xen - Olivier Lambert & Jul...XPDS16: Xen Orchestra: building a Cloud on top of Xen - Olivier Lambert & Jul...
XPDS16: Xen Orchestra: building a Cloud on top of Xen - Olivier Lambert & Jul...
 
XPDS16: Hypervisor-based Security: Vicarious Learning via Introspektioneerin...
XPDS16:  Hypervisor-based Security: Vicarious Learning via Introspektioneerin...XPDS16:  Hypervisor-based Security: Vicarious Learning via Introspektioneerin...
XPDS16: Hypervisor-based Security: Vicarious Learning via Introspektioneerin...
 
XPDS14 - Xen on ARM: Status and Performance - Stefano Stabellini, Citrix
XPDS14 - Xen on ARM: Status and Performance - Stefano Stabellini, CitrixXPDS14 - Xen on ARM: Status and Performance - Stefano Stabellini, Citrix
XPDS14 - Xen on ARM: Status and Performance - Stefano Stabellini, Citrix
 
XPDS16: CPUID handling for guests - Andrew Cooper, Citrix
XPDS16:  CPUID handling for guests - Andrew Cooper, CitrixXPDS16:  CPUID handling for guests - Andrew Cooper, Citrix
XPDS16: CPUID handling for guests - Andrew Cooper, Citrix
 
LFNW2014 Advanced Security Features of Xen Project Hypervisor
LFNW2014 Advanced Security Features of Xen Project HypervisorLFNW2014 Advanced Security Features of Xen Project Hypervisor
LFNW2014 Advanced Security Features of Xen Project Hypervisor
 
LCNA14: Why Use Xen for Large Scale Enterprise Deployments? - Konrad Rzeszute...
LCNA14: Why Use Xen for Large Scale Enterprise Deployments? - Konrad Rzeszute...LCNA14: Why Use Xen for Large Scale Enterprise Deployments? - Konrad Rzeszute...
LCNA14: Why Use Xen for Large Scale Enterprise Deployments? - Konrad Rzeszute...
 
ELC21: VM-to-VM Communication Mechanisms for Embedded
ELC21: VM-to-VM Communication Mechanisms for EmbeddedELC21: VM-to-VM Communication Mechanisms for Embedded
ELC21: VM-to-VM Communication Mechanisms for Embedded
 
Scale 12x Securing Your Cloud with The Xen Hypervisor
Scale 12x Securing Your Cloud with The Xen HypervisorScale 12x Securing Your Cloud with The Xen Hypervisor
Scale 12x Securing Your Cloud with The Xen Hypervisor
 
Xen and the art of embedded virtualization (ELC 2017)
Xen and the art of embedded virtualization (ELC 2017)Xen and the art of embedded virtualization (ELC 2017)
Xen and the art of embedded virtualization (ELC 2017)
 
µ-Xen
µ-Xenµ-Xen
µ-Xen
 
XPDS14 - Zero-Footprint Guest Memory Introspection from Xen - Mihai Dontu, Bi...
XPDS14 - Zero-Footprint Guest Memory Introspection from Xen - Mihai Dontu, Bi...XPDS14 - Zero-Footprint Guest Memory Introspection from Xen - Mihai Dontu, Bi...
XPDS14 - Zero-Footprint Guest Memory Introspection from Xen - Mihai Dontu, Bi...
 
PVH : PV Guest in HVM container
PVH : PV Guest in HVM containerPVH : PV Guest in HVM container
PVH : PV Guest in HVM container
 
QEMU Disk IO Which performs Better: Native or threads?
QEMU Disk IO Which performs Better: Native or threads?QEMU Disk IO Which performs Better: Native or threads?
QEMU Disk IO Which performs Better: Native or threads?
 
Kvm
KvmKvm
Kvm
 
Virtunoid: Breaking out of KVM
Virtunoid: Breaking out of KVMVirtunoid: Breaking out of KVM
Virtunoid: Breaking out of KVM
 
Xen and Client Virtualization: the case of XenClient XT
Xen and Client Virtualization: the case of XenClient XTXen and Client Virtualization: the case of XenClient XT
Xen and Client Virtualization: the case of XenClient XT
 
XPDS16: Xen Scalability Analysis - Weidong Han, Zhichao Huang & Wei Yang, Huawei
XPDS16: Xen Scalability Analysis - Weidong Han, Zhichao Huang & Wei Yang, HuaweiXPDS16: Xen Scalability Analysis - Weidong Han, Zhichao Huang & Wei Yang, Huawei
XPDS16: Xen Scalability Analysis - Weidong Han, Zhichao Huang & Wei Yang, Huawei
 
ALSF13: Xen on ARM - Virtualization for the Automotive Industry - Stefano Sta...
ALSF13: Xen on ARM - Virtualization for the Automotive Industry - Stefano Sta...ALSF13: Xen on ARM - Virtualization for the Automotive Industry - Stefano Sta...
ALSF13: Xen on ARM - Virtualization for the Automotive Industry - Stefano Sta...
 
RunX: deploy real-time OSes as containers at the edge
RunX: deploy real-time OSes as containers at the edgeRunX: deploy real-time OSes as containers at the edge
RunX: deploy real-time OSes as containers at the edge
 

Ähnlich wie XPDS16: The OpenXT Project in 2016 - Christopher Clark, BAE Systems

Software Update Mechanisms: Selecting the Best Solutin for Your Embedded Linu...
Software Update Mechanisms: Selecting the Best Solutin for Your Embedded Linu...Software Update Mechanisms: Selecting the Best Solutin for Your Embedded Linu...
Software Update Mechanisms: Selecting the Best Solutin for Your Embedded Linu...ICS
 
4 implementation
4 implementation4 implementation
4 implementationhanmya
 
Webinar: OpenEBS - Still Free and now FASTEST Kubernetes storage
Webinar: OpenEBS - Still Free and now FASTEST Kubernetes storageWebinar: OpenEBS - Still Free and now FASTEST Kubernetes storage
Webinar: OpenEBS - Still Free and now FASTEST Kubernetes storageMayaData Inc
 
final proposal-Xen based Hypervisor in a Box
final proposal-Xen based Hypervisor in a Boxfinal proposal-Xen based Hypervisor in a Box
final proposal-Xen based Hypervisor in a BoxParamkusham Shruthi
 
如何在 Ubuntu 上更快、更便捷地部署物联网设备
如何在 Ubuntu 上更快、更便捷地部署物联网设备如何在 Ubuntu 上更快、更便捷地部署物联网设备
如何在 Ubuntu 上更快、更便捷地部署物联网设备Rex Tsai
 
Linux container & docker
Linux container & dockerLinux container & docker
Linux container & dockerejlp12
 
Openstack_administration
Openstack_administrationOpenstack_administration
Openstack_administrationAshish Sharma
 
Ap 06 4_10_simek
Ap 06 4_10_simekAp 06 4_10_simek
Ap 06 4_10_simekNguyen Vinh
 
Red Hat multi-cluster management & what's new in OpenShift
Red Hat multi-cluster management & what's new in OpenShiftRed Hat multi-cluster management & what's new in OpenShift
Red Hat multi-cluster management & what's new in OpenShiftKangaroot
 
OpenShift 4 installation
OpenShift 4 installationOpenShift 4 installation
OpenShift 4 installationRobert Bohne
 
Revolutionizing the cloud with container virtualization
Revolutionizing the cloud with container virtualizationRevolutionizing the cloud with container virtualization
Revolutionizing the cloud with container virtualizationWSO2
 
OpenShift_Installation_Deep_Dive_Robert_Bohne.pdf
OpenShift_Installation_Deep_Dive_Robert_Bohne.pdfOpenShift_Installation_Deep_Dive_Robert_Bohne.pdf
OpenShift_Installation_Deep_Dive_Robert_Bohne.pdfssuser9e06a61
 
2012-03-15 What's New at Red Hat
2012-03-15 What's New at Red Hat2012-03-15 What's New at Red Hat
2012-03-15 What's New at Red HatShawn Wells
 
Automated Deployment and Management of Edge Clouds
Automated Deployment and Management of Edge CloudsAutomated Deployment and Management of Edge Clouds
Automated Deployment and Management of Edge CloudsJay Bryant
 
Proxmox ve-datasheet
Proxmox ve-datasheetProxmox ve-datasheet
Proxmox ve-datasheetMiguel Angel
 

Ähnlich wie XPDS16: The OpenXT Project in 2016 - Christopher Clark, BAE Systems (20)

Open stack wtf_(1)
Open stack  wtf_(1)Open stack  wtf_(1)
Open stack wtf_(1)
 
Software Update Mechanisms: Selecting the Best Solutin for Your Embedded Linu...
Software Update Mechanisms: Selecting the Best Solutin for Your Embedded Linu...Software Update Mechanisms: Selecting the Best Solutin for Your Embedded Linu...
Software Update Mechanisms: Selecting the Best Solutin for Your Embedded Linu...
 
4 implementation
4 implementation4 implementation
4 implementation
 
Webinar: OpenEBS - Still Free and now FASTEST Kubernetes storage
Webinar: OpenEBS - Still Free and now FASTEST Kubernetes storageWebinar: OpenEBS - Still Free and now FASTEST Kubernetes storage
Webinar: OpenEBS - Still Free and now FASTEST Kubernetes storage
 
final proposal-Xen based Hypervisor in a Box
final proposal-Xen based Hypervisor in a Boxfinal proposal-Xen based Hypervisor in a Box
final proposal-Xen based Hypervisor in a Box
 
如何在 Ubuntu 上更快、更便捷地部署物联网设备
如何在 Ubuntu 上更快、更便捷地部署物联网设备如何在 Ubuntu 上更快、更便捷地部署物联网设备
如何在 Ubuntu 上更快、更便捷地部署物联网设备
 
LWdatasheet
LWdatasheetLWdatasheet
LWdatasheet
 
Linux container & docker
Linux container & dockerLinux container & docker
Linux container & docker
 
Openstack_administration
Openstack_administrationOpenstack_administration
Openstack_administration
 
Ap 06 4_10_simek
Ap 06 4_10_simekAp 06 4_10_simek
Ap 06 4_10_simek
 
Red Hat multi-cluster management & what's new in OpenShift
Red Hat multi-cluster management & what's new in OpenShiftRed Hat multi-cluster management & what's new in OpenShift
Red Hat multi-cluster management & what's new in OpenShift
 
Review of QNX
Review of QNXReview of QNX
Review of QNX
 
OpenShift 4 installation
OpenShift 4 installationOpenShift 4 installation
OpenShift 4 installation
 
Purnima
PurnimaPurnima
Purnima
 
Revolutionizing the cloud with container virtualization
Revolutionizing the cloud with container virtualizationRevolutionizing the cloud with container virtualization
Revolutionizing the cloud with container virtualization
 
OpenShift_Installation_Deep_Dive_Robert_Bohne.pdf
OpenShift_Installation_Deep_Dive_Robert_Bohne.pdfOpenShift_Installation_Deep_Dive_Robert_Bohne.pdf
OpenShift_Installation_Deep_Dive_Robert_Bohne.pdf
 
2012-03-15 What's New at Red Hat
2012-03-15 What's New at Red Hat2012-03-15 What's New at Red Hat
2012-03-15 What's New at Red Hat
 
Automated Deployment and Management of Edge Clouds
Automated Deployment and Management of Edge CloudsAutomated Deployment and Management of Edge Clouds
Automated Deployment and Management of Edge Clouds
 
Proxmox ve-datasheet
Proxmox ve-datasheetProxmox ve-datasheet
Proxmox ve-datasheet
 
Explore asp.net core 3.0 features
Explore asp.net core 3.0 featuresExplore asp.net core 3.0 features
Explore asp.net core 3.0 features
 

Mehr von The Linux Foundation

ELC2019: Static Partitioning Made Simple
ELC2019: Static Partitioning Made SimpleELC2019: Static Partitioning Made Simple
ELC2019: Static Partitioning Made SimpleThe Linux Foundation
 
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...The Linux Foundation
 
XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...
XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...
XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...The Linux Foundation
 
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...The Linux Foundation
 
XPDDS19 Keynote: Unikraft Weather Report
XPDDS19 Keynote:  Unikraft Weather ReportXPDDS19 Keynote:  Unikraft Weather Report
XPDDS19 Keynote: Unikraft Weather ReportThe Linux Foundation
 
XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...
XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...
XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...The Linux Foundation
 
XPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, Xilinx
XPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, XilinxXPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, Xilinx
XPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, XilinxThe Linux Foundation
 
XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...
XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...
XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...The Linux Foundation
 
XPDDS19: Memories of a VM Funk - Mihai Donțu, Bitdefender
XPDDS19: Memories of a VM Funk - Mihai Donțu, BitdefenderXPDDS19: Memories of a VM Funk - Mihai Donțu, Bitdefender
XPDDS19: Memories of a VM Funk - Mihai Donțu, BitdefenderThe Linux Foundation
 
OSSJP/ALS19: The Road to Safety Certification: Overcoming Community Challeng...
OSSJP/ALS19:  The Road to Safety Certification: Overcoming Community Challeng...OSSJP/ALS19:  The Road to Safety Certification: Overcoming Community Challeng...
OSSJP/ALS19: The Road to Safety Certification: Overcoming Community Challeng...The Linux Foundation
 
OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...
 OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making... OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...
OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...The Linux Foundation
 
XPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, Citrix
XPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, CitrixXPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, Citrix
XPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, CitrixThe Linux Foundation
 
XPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltd
XPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltdXPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltd
XPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltdThe Linux Foundation
 
XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...
XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...
XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...The Linux Foundation
 
XPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&D
XPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&DXPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&D
XPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&DThe Linux Foundation
 
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM Systems
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM SystemsXPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM Systems
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM SystemsThe Linux Foundation
 
XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...
XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...
XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...The Linux Foundation
 
XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...
XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...
XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...The Linux Foundation
 
XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...
XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...
XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...The Linux Foundation
 
XPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSE
XPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSEXPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSE
XPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSEThe Linux Foundation
 

Mehr von The Linux Foundation (20)

ELC2019: Static Partitioning Made Simple
ELC2019: Static Partitioning Made SimpleELC2019: Static Partitioning Made Simple
ELC2019: Static Partitioning Made Simple
 
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...
 
XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...
XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...
XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...
 
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...
 
XPDDS19 Keynote: Unikraft Weather Report
XPDDS19 Keynote:  Unikraft Weather ReportXPDDS19 Keynote:  Unikraft Weather Report
XPDDS19 Keynote: Unikraft Weather Report
 
XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...
XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...
XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...
 
XPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, Xilinx
XPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, XilinxXPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, Xilinx
XPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, Xilinx
 
XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...
XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...
XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...
 
XPDDS19: Memories of a VM Funk - Mihai Donțu, Bitdefender
XPDDS19: Memories of a VM Funk - Mihai Donțu, BitdefenderXPDDS19: Memories of a VM Funk - Mihai Donțu, Bitdefender
XPDDS19: Memories of a VM Funk - Mihai Donțu, Bitdefender
 
OSSJP/ALS19: The Road to Safety Certification: Overcoming Community Challeng...
OSSJP/ALS19:  The Road to Safety Certification: Overcoming Community Challeng...OSSJP/ALS19:  The Road to Safety Certification: Overcoming Community Challeng...
OSSJP/ALS19: The Road to Safety Certification: Overcoming Community Challeng...
 
OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...
 OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making... OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...
OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...
 
XPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, Citrix
XPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, CitrixXPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, Citrix
XPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, Citrix
 
XPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltd
XPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltdXPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltd
XPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltd
 
XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...
XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...
XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...
 
XPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&D
XPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&DXPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&D
XPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&D
 
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM Systems
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM SystemsXPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM Systems
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM Systems
 
XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...
XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...
XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...
 
XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...
XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...
XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...
 
XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...
XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...
XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...
 
XPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSE
XPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSEXPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSE
XPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSE
 

Kürzlich hochgeladen

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Kürzlich hochgeladen (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

XPDS16: The OpenXT Project in 2016 - Christopher Clark, BAE Systems

  • 1. OpenXT Project in 2016 Christopher Clark BAE Systems Xen Developer Summit, 25-26th August, 2016
  • 2. Presenter: Christopher Clark Xen affiliations: Projects: Roles: ● BAE Systems and the OpenXT Project - since January 2016. ● { non-Xen engineering work, 4 years } ● Citrix Systems ● XenSource Inc. ● Intel Corporation ● Cambridge University Computer Laboratory OpenXT - XenClient XT - XenClient - XenServer - Xen hypervisor ● Interoperability Architect ● Release Manager ● Principal Engineer ● Graduate Student Focus of work in 2016: Governance for the OpenXT Project ; Security review of OpenXT software.
  • 3. Outline ● Introduction to OpenXT ● Distinguishing aspects of OpenXT ● Current activity within the OpenXT Project ○ Recent developments ○ Work in progress ○ Roadmap items
  • 4. OpenXT : motivation* ● Advance progress towards more secure computing through a modern, practical, open system architecture ● Provide a common platform of software to build upon, prioritizing extensibility, adaptable to diverse use cases, to promote collaboration and sharing of common components ● Support building usable systems that are robust to partial compromise *Note: these are the opinion of the presenter
  • 5. OpenXT nutshell ● Core technology : Virtualization. Xen. ● Toolkit : full software stack for a virtualized system ○ OpenEmbedded toolchain, Linux kernels, VM filesystems, toolstack, … . “Batteries included.” ○ Extensible, configurable for diverse use cases and commercial derived products. ○ Supports Service VMs and APIs. ● Security : primary criteria in architecture decisions ○ Design enables strong assurances rooted in hardware. ○ Community has expertise. ● Open Source : OSI-approved licenses, open development ● Client capable : validated support for desktop, laptop hardware and devices
  • 6. What distinguishes OpenXT? ● Security focus of the system architecture and technology selection ● Community ○ Depth of expertise in critical technologies, diversity of experience, direction of focus. ○ Members involved in development of platform security technologies across industry. ● Client use cases supported ● Open Source, OpenEmbedded build and toolchain ○ Participation in upstream communities and commitment to support downstream projects. ● Validated integration ○ An integrated system of many complex software components. ○ Derivative products have been successfully Certified and deployed.
  • 7. Build Product A current build of OpenXT software today will produce a bootable ISO to run an installer. Install provisions the Xen hypervisor and a collection of helper VMs running Linux to provide a hardened desktop environment for running Windows or Linux desktop workloads. It provides guest tools with paravirtualized device drivers to install within the guest VMs. Extensibility of this system: ● At software compile and build time: customizable via OpenEmbedded Layers. ● At deployment time: API support for third-party Service VMs.
  • 8. Platform Properties of OpenXT Our community has consensus that these properties of the software are important to us: ● Integrity of operating software assured via measured launch and hardware-rooted enforcement of isolation between components. ● Protection of storage, confidentiality and integrity of system configuration and user data. ● Protection of communications, with isolation between network device control software, encryption software with network credentials, and user software. ● Protection of concurrent user software execution environments. ● Protection of user input via local keyboard, mouse and touchscreen devices. ● Protection of graphical output, with support for high-performance 3D desktops. ● Policy-based assignment and confinement of hardware peripherals. ● Compatibility with modern computer hardware and contemporary operating systems. ● Architected and licensed to support commercial derivative software. A maintained list of platform properties is at: https://openxt.atlassian.net/wiki/display/CS/Gov2%3A+OpenXT+Platform+Properties+and+Layers
  • 9. Architecture aspects / Technologies ● OpenEmbedded ecosystem provides toolchain and software platform ● The OpenXT Project is a strong proponent of disaggregation and isolation ○ Provides a distributed network stack with VTd-enforced isolation ● Measured Launch : using Intel TXT, tboot, TPM 1.2, trousers ● Read-only root filesystems with reset upon power operations ● Linux-based stub-domains to encapsulate Qemu instances ● Xen Security Modules enabled and enforcing ● SELinux enabled and enforcing with a tailored policy in Dom0 and NDVM ● Blktap2 storage path, soon to be blktap3 ● Modern PV-USB stack with Windows and Linux guest support ● Specialized human interface device input layer
  • 10. OpenEmbedded A mature Open Source, collaborative, distributed, software packaging project and toolchain. ● OpenEmbedded delivers many software packages. ○ Toolkit for assembling an entirely customized Linux distribution. ● We use it to assemble multiple customized Linux distributions to build OpenXT ○ Domain 0 ○ Stubdomains ○ The OpenXT Installer ○ NDVM ○ UIVM ○ SyncVM ○ ...
  • 11. OpenEmbedded OpenEmbedded delivers many software packages. ● Each package is described in a Recipe. ○ Recipes declare package version, source URL, license, build steps, customizations, etc. ● Collections of recipes are maintained in Layers. ○ Software within a layer is maintained together to ensure compatibility between packages. ○ A layer is a git repository with a curated collection of recipe files with community governance.
  • 12. OpenEmbedded ● Downstream layers can override or extend recipes of upstream layers to apply customizations, if needed. ● Downstream layers benefit from upstream layers component maintainership. Maximizes community collaboration on shared common components. ● OpenXT provides its own Layer. ○ In near future, it will be multiple layers - we are clustering our components into separate layers. ○ When you work on OpenXT, you work with git repos containing recipes or source code of components that recipes compile and package. ● OpenEmbedded is one of several projects “upstream” to OpenXT. We work to integrate our changes into the highest layer appropriate.
  • 13. OpenEmbedded Layers in OpenXT Layers in OpenXT: ● openembedded-core ● meta-openembedded*1 : meta-xfce, meta-oe, meta-gnome, meta-networking, meta-python ● meta-java ● meta-selinux ● meta-intel ● coming soon: meta-virtualization ● xenclient-oe*2 Other layers of interest: ● meta-security-isafw ● meta-measured ● meta-servicevm *1 meta-openembedded actually provides multiple layers, rather than just one *2 “xenclient-oe” should be renamed and separated into “meta-openxt-*” layers
  • 14. Xen hypervisor and Qemu device emulator Numerous modifications vs Upstream Xen + Qemu. Motivated by our secure client use cases. ● Xen Security Modules (XSM): Enabled and Enforcing. ● Suspend, hibernate and power management changes. ● v4v interdomain communication protocol + firewall. ● Modifications to blktap2 storage support for encryption and disk transfers - blktap3 work due to commence soon. ● Cosmetic fixes to correctly display Windows boot graphics. ● ACPI and SMBIOS support for laptop vendor customizations - now upstream and undergoing further development. ● Hardware quirk fixes. ● Setting cache attributes on mapped memory for video support. The delta vs upstream is decreasing. Upstream capabilities improve with our involvement and former XenClient features are removed from OpenXT. Current migration work towards to newer hypervisor versions is reducing our patch queue.
  • 15. Distributed network architecture A key distinguishing feature of the OpenXT system Default configuration: All of the physical PCI network devices are assigned to a single Network Device Virtual Machine (NDVM) and isolated using VTd. NIC device driver NIC device driver Wi-Fi device driver Bridging & Routing Netback Network Manager Network Manager User Interface Windows PV netfront Linux PV netfront Dom0 UIVM NDVM Toolstack Windows Desktop Linux Desktop Xen
  • 16. Distributed network architecture A key distinguishing feature of the OpenXT system architecture. Default configuration: All of the physical PCI network devices are assigned to a single Network Device Virtual Machine (NDVM) and isolated using VTd. The NDVM contains all the network device drivers. Exports access to the networks via virtual interfaces into the guest VMs. Bridging or routing guest networks and physical networks happens in the NDVM. Dom0 is not part of the guest networking datapath. User control of networks is via the Network Manager applet in the User Interface VM. This connects to the network-manager daemon via dbus proxied over v4v. Architecture isolates network device drivers from all VMs and dom0. A compromised network device driver only compromises the NDVM and not the rest of the system.
  • 17. Network architecture Alternative configuration OpenXT also supports running multiple NDVMs: one per Network Interface Card. Configuration instructions are in the project documentation. This stronger configuration enables VTd-enforced isolation between physical networks. It costs additional resources (RAM, CPU) to run additional NDVMs, and can alter maximum throughput and packet latency across networks but it enables insertion of protected middlebox VMs into the cross-network path.
  • 18. Network architecture The OpenXT platform supports development of "NILF-VM"s: Network Interface Layer Function VMs. This is to support third-party networking software integration. eg: a VPN interposition NILF-VM. A VM that provides encapsulation of all network traffic via a VPN, interposing in-between a guest Windows VM and the NDVM assigned to the physical device NIC. This isolates VPN credentials from both the guest Windows software and the network device driver. The unencrypted traffic data is never accessible by the NIC hardware or the network device driver. Demonstrates Xen’s strength, the advantage provided by a type-1 hypervisor.
  • 19. Measured Launch Core concept: A sequence of software measurements is taken during system boot, with each component measured prior to launching it, and the measurements securely stored in the hardware Trusted Platform Module. Measurements are then used to unlock encryption keys that grant access to system configuration and user data, providing confidentiality and constraining access to only when the trusted system software is running.
  • 20. Measured Launch ● Implementation built upon hardware platform primitives: Intel TXT and a TPM device. ● Measurements include: Xen binary, Dom0 kernel, kernel command lines, Dom0 initrd, Dom0 rootfs, tboot, microcode, Intel ACMs, and XSM policy. ● Uses grub version 2, with a fixed, measured grub command line. Interactive grub prompt is disabled. The measurements of all components must be correct to acquire the decryption key to unlock access to the host platform configuration data stored on disk and the keys to the disk images of guest VMs. Notable components: ● Tboot is the Xen launch verifier for TXT. ● TrouSerS, TCG Software Stack. User space software that drives the TPM via a Dom0 kernel device. ● Disk encryption is performed with LUKS. AES-NI accelerates encryption and decryption data paths.
  • 21. Measured Launch Recent changes to OpenXT’s Measured Launch: ● LUKS configuration changes to replace a RSA-key wrapped password to an admin supplied password ● Removal of some platform reboots during install for secret sealing ● Preparatory work towards future support for remote attestation
  • 22. Linux-based Stub-domains ● Motivation: Hardening. Move the large qemu attack surface outside dom0. ○ Has successfully mitigated a number of Xen Security Advisory defects. ○ Acknowledgement: support for disaggregation adds complexity to the hypervisor and tools. ● Limited, read-only root filesystem ● Stateless across domain restarts ● Reduced Linux kernel configuration
  • 23. Access Control ● Xen Security Modules : Enabled and Enforcing ○ Mandatory Access Control within the hypervisor, with the Flask architecture ○ Access control points throughout the hypervisor ○ Governed by a policy loaded at boot ● SELinux : Enabled and Enforcing in Dom0 and NDVM ○ Using a tailored policy for confinement
  • 24. OpenXT PV-USB ● Originally from Virtual Computer’s NXtop, Citrix’s XenClient Enterprise product ○ A production-quality Windows front-end and Linux back-end. Open Source. ○ USB 2.0. ● Linux front-end developed in OpenXT ○ by AIS’s Open Source team. Validated and used in production. ● Orchestrated by a USB control daemon in dom0, also developed in OpenXT ○ Standalone software, primarily interfaces to udev and, to a lesser extent, libUSB. ○ Handles udev events for new devices according to device or device-class policy. ○ Writes XenStore entries to establish connections between the PV-USB front and backends.
  • 25. OpenXT PV-USB ● Uses a novel two-layer “indirect grant refs” ring structure for efficiency ○ Enables bulk transfer of many grant-refs per ring transaction. ● Upstream-suitable : interest or assistance is very welcome ○ OpenXT is adopting other upstream Xen PV drivers and porting PV-USB to upstream xenbus
  • 26. OpenXT PV-USB software references Windows front-end driver code: https://github.com/OpenXT/xc-vusb https://github.com/OpenXT/xc-windows Linux front-end driver code: https://github.com/OpenXT/pv-linux-drivers/tree/master/xc-vusb Linux back-end driver code: Takes control of the assigned USB device’s configurations and interfaces. https://github.com/OpenXT/xenclient-oe/blob/master/recipes-kernel/linux/4.4/patches/usbback-base.patch USB policy control daemon, runs in the privileged USB control domain, ie. dom0: Controls USB policy, assignment and management. Monitors udev events, applies policy to the types of devices it sees and assigns devices to VMs by writing XenStore nodes to trigger front-back driver pair to initiate standard xenbus handshake. https://openxt.atlassian.net/wiki/display/OD/vUSB+Daemon https://github.com/OpenXT/vusb-daemon
  • 27. Secure Keyboard and Mouse Input An essential component for client virtualization. The input server runs in Dom0. ● Monitors udev for new input devices ○ Claims HID devices: keyboard, mouse, touchpad, touchscreen ● Demultiplexes input events ● Directs input events to the intended recipient VM ○ Including the UIVM, showing the local console UI ○ Prevents input snooping by other VMs ○ Enforces platform screen lock ○ Performs secure password capture for Dom0 : UIVM cannot snoop. ● Scales mouse movement for guest VMs running at different resolutions
  • 28. v4v : an interdomain communication transport ● An OpenXT technology, originally developed for XenClient. ● Hypervisor-mediated data copies via private ring buffers with notifications. ● Used by OpenXT and in production in its derivative products, plus a variant in use at Bromium. ● Has benefitted from previous reviews by the Xen Community.
  • 29. v4v : an interdomain communication transport Motivations for v4v versus any other interdomain communication mechanism: ● Strong isolation between communicating domains ○ No memory is shared between VMs ● Strong enforcement of policy controls on VM communication ○ A firewall within the hypervisor enforces rules that are set externally ● High performance suitable for sustained throughput ● A clean mapping to Linux and Windows native I/O primitives ● Clear separation from guest Operating System networking stacks ● A foundation for the future work that we intend to do
  • 30. v4v : an interdomain communication transport Known limitations: ● Current implementation has exposure to resource exhaustion ○ To be remedied with consumption constraints ○ DoS and scalability support were lesser concerns for the original client use cases. ● v4vtables firewall is a basic implementation ○ A new firewall is proposed to replace or extend v4vtables with XSM/Flask and support for in-guest SELinux ● Linux driver software requires improvement ● libvchan bindings have been requested ● Documentation is required ○ v4v comparison with other interdomain communication technologies ○ Hypervisor hypercall interface, Linux and Windows v4v driver interface and user-space library interface ○ Mechanisms to constrain v4v: XSM and the v4vtables-successor
  • 31. v4v : an interdomain communication transport Strong isolation avoids these concerns that affect inter-VM shared-memory technologies: Impact on protocol integrity ● Peer domains can directly tamper with control structures in the shared memory region. Impact on peer authentication ● Cannot directly know which principal wrote the protocol payload into memory to authenticate sender. Impact on confidentiality ● Data may intentionally or accidentally leak through parts of shared memory not in use by the protocol. ● Page ownership may be intentionally or accidentally shared with additional domains, allowing observation of data intended for one receiver. Cost of extra assurance dependencies ● Protocol connection via XenStore forces XenStore into the TCB for communicating components.
  • 32. v4v : an interdomain communication transport Upcoming work: ● New firewall using XSM/Flask architecture ○ Work towards a unified access control architecture in OpenXT with clear policy representation, better tooling, fewer opportunities for gaps or error ○ XSM/Flask to enforce Mandatory Access Control over v4v connections between domains ○ v4vtables may be extended to enable guests to express self-protection rules ○ SELinux to control v4v bind, send operations by individual processes ○ Add support for obtaining Flask peer labels for v4v, as per event channels ○ Convey SELinux security context across domain boundaries for access checks at recipient ● Address the known limitations described in the earlier slide. We continue to be interested in engaging upstream Xen with v4v.
  • 33. Recent Developments ● OpenXT Summit : June 2016, Washington, D.C. ○ 48 attendees from 24 organizations ○ Two days of presentations and moderated discussions on ecosystem topics ● Version 6.0 of OpenXT software release ○ Update the core distribution to OpenEmbedded Jethro release ○ Skylake hardware platform support ○ Xen hypervisor upgrade to 4.3.4 - Xen 4.6.1 is now in our master branch; work on 4.7 is next ○ Linux kernel upgrade to 4.4.16 - OpenXT 6.0.x point releases will track 4.4.x kernel updates ○ Qemu build configuration security hardened ○ Codebase security review. Package updates and selective patch inclusion for security fixes ○ Containerized build system, improved ease of use ● Project Governance ○ Project charter documents and codifying project processes
  • 34. Work in Progress Major focus is on accelerated tracking and engagement with upstream projects. ● Restructuring OpenXT into distinct OpenEmbedded Layers ○ Simplifies work for derivative projects to choose just the components they need ○ Optionality addresses the tension between feature addition vs. increase in attack surface ● Reducing specialized components of the OpenXT software ○ Adopting versions present in upstream OpenEmbedded layers ○ Working with upstream layers to add capabilities we need, assist with maintenance ○ Shrinking OpenXT Project codebase to just that which is unique to OpenXT requirements ● Xen hypervisor upgrade ○ 4.6.1 has just been successfully tested and merged into master development branch ○ 4.7.x will be immediate next target
  • 35. Work in Progress ● Toolstack refactoring ○ Port to introduce libxl into the OpenXT Haskell toolstack running outside dom0 ● v4v improvement ○ Please come and talk to community members about this ● Measured Launch enhancements ○ Towards forward-sealing across software upgrades ● Adopting upstream Windows PV-drivers ○ For network and block devices, to use in addition to our PV drivers for other devices ● Alternative graphics display architecture ○ Developed on an OpenXT-derivative platform ○ Please see the AIS presentation at this Xen Developer Summit
  • 36. Roadmap items ● Community members have plans to integrate Xen’s vTPM and vTPM manager into OpenXT in the near future. ● OpenXT community intends to adopt and maintain blktap3, working with the XenServer team to assist support of their existing customer requirements. ● Make tboot into a UEFI module.
  • 37. Where we work on OpenXT ● Public mailing list : openxt@googlegroups.com ● IRC #OpenXT on freenode ● Monthly community telephone call, open to all ● Confluence public wiki ● JIRA issue tracker on Atlassian cloud ● Presence in upstream projects: OpenEmbedded, Xen, Linux TPM tools, ... You are welcome to join us! openxt.org
  • 38. EOF Thank-you for your attention. Thanks to the members of the OpenXT community for the work described here and material supporting this presentation. -xtopher Copyright (c) 2016 BAE Systems, Inc. Created by Christopher Clark. This work is licensed under the Creative Commons Attribution 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/. openxt.org