qemu-devel
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Qemu-devel] QEMU as a "virtual smart card"?


From: Jamie Lokier
Subject: Re: [Qemu-devel] QEMU as a "virtual smart card"?
Date: Wed, 2 Sep 2009 00:47:16 +0100
User-agent: Mutt/1.5.13 (2006-08-11)

Bud P. Bruegger wrote:
> At least looking naively at QEMU, it seems that its CPU and RAM are
> well protected from the host operating system--in a way to say make it
> practically impossible for some malware to extract the secret key used
> in a virtual machine.  

No, the CPU and RAM state inside QEMU is easily read from the host.
Just run a debugger and attach to the running QEMU process.  It's not
completely simple, but it's far from secure.

> Is this a valid conception of what QEMU does?  How good is the
> isolation of a virtual machine from the host operating system.

The virtual machine is an ordinary process in the host operating
system, so it's contents can be inspected just like any other host
process using debugging tools.

The point of a VM is to make sure things on the VM cannot inspect the
host or anything else running on the host, including other VMs, except
for what it's given access to...  It doesn't isolate the other way around.

However, you can still isolate using ordinary multi-user host process
protections, so unprivileged user A cannot access user B's VMs.  VMs
are no different from other processes in this respect.

> We are also interested in the isolation of input devices, in
> particularly the keyboard as to prevent PIN sniffing.  My "naive"
> impression is that key logging for a PS/2 keyboard is probably more
> difficult than with a USB keyboard.  Is there any thruth to my
> misconception?

None.  Key logging for PS/2 is easier than USB using radio antennae or
by inspecting the protocol or by looking at system calls relaying the
data, or even by looking at kernel memory buffers.

Maybe you meant that keylogging is more difficult for USB than PS/2?

> Finally one last question questions:
> 
> * Is there any way of getting exclusive access to an USB pen drive
> from a virtual machine, preventing the host operating system to say take
> an image of the content?

Yes against casually reading it, but no against a determined hacker,
who can examine everything which happens on the virtual machine,
including all I/O, if they have access to the host and suitable
permissions to access the VM's host process.

-- Jamie




reply via email to

[Prev in Thread] Current Thread [Next in Thread]