© 2004 IBM Corporation IBM ^ z/VM Design considerations > Security > Performance (SIE)

Slides:



Advertisements
Similar presentations
Operating Systems Components of OS
Advertisements

Ethernet Switch Features Important to EtherNet/IP
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: VLANs Routing & Switching.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
CS-3013 & CS-502, Summer 2006 Virtual Machine Systems1 CS-502 Operating Systems Slides excerpted from Silbershatz, Ch. 2.
CS-550 (M.Soneru): Protection and Security - 1 [SaS] 1 Protection and Security.
Introduction to the new mainframe: Large-Scale Commercial Computing © Copyright IBM Corp., All rights reserved. Chapter 4: Integrity and security.
Hands-On Microsoft Windows Server 2003 Administration Chapter 3 Administering Active Directory.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
Virtualization and the Cloud
Lesson 9: Creating and Configuring Virtual Networks
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #29-1 Chapter 33: Virtual Machines Virtual Machine Structure Virtual Machine.
A Guide to major network components
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
VM Basics – some terminology – Guest: a system that is operating in a virtual machine, a.k.a user – Running under/on VM : running a system as a guest of.
The Origin of the VM/370 Time-sharing system Presented by Niranjan Soundararajan.
VLAN Trunking Protocol (VTP) W.lilakiatsakun. VLAN Management Challenge (1) It is not difficult to add new VLAN for a small network.
Tanenbaum 8.3 See references
1 Kyung Hee University Prof. Choong Seon HONG Network Control.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Operating System A program that controls the execution of application programs An interface between applications and hardware 1.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: Implementing VLAN Security Routing And Switching.
Virtualization Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation is licensed.
Chapter 8: Virtual LAN (VLAN)
Operating Systems ECE344 Ashvin Goel ECE University of Toronto OS-Related Hardware.
Moodle (Course Management Systems). Managing Your class In this Lecture, we’ll cover course management, including understanding and using roles, arranging.
Computers Operating System Essentials. Operating Systems PROGRAM HARDWARE OPERATING SYSTEM.
Slide 3-1 Copyright © 2004 Pearson Education, Inc. Operating Systems: A Modern Perspective, Chapter 3.
© 2004 IBM Corporation IBM ^ Objectives  Describe how CP commands are used and structured  Explain the importance of the VM Dump Tool and VM Virtual.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
G53SEC 1 Reference Monitors Enforcement of Access Control.
SAM-21 Fortress Model and Defense in Depth Some revision on Computer Architecture.
 Virtual machine systems: simulators for multiple copies of a machine on itself.  Virtual machine (VM): the simulated machine.  Virtual machine monitor.
Operating System Organization Chapter 3 Michelle Grieco.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Operating Systems Security
Security Vulnerabilities in A Virtual Environment
Chapter 4 Version 1 Virtual LANs. Introduction By default, switches forward broadcasts, this means that all segments connected to a switch are in one.
Full and Para Virtualization
Lecture 4 Page 1 CS 111 Online Modularity and Virtualization CS 111 On-Line MS Program Operating Systems Peter Reiher.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: VLANs Routing & Switching.
Protection of Processes Security and privacy of data is challenging currently. Protecting information – Not limited to hardware. – Depends on innovation.
Click to add text © 2004 IBM Corporation IBM ^ z/VM Basic Structures and Commands Control Program.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Unit 2 VIRTUALISATION. Unit 2 - Syllabus Basics of Virtualization Types of Virtualization Implementation Levels of Virtualization Virtualization Structures.
1 Chapter 2: Operating-System Structures Services Interface provided to users & programmers –System calls (programmer access) –User level access to system.
Cisco Exam Questions IMPLEMENTING CISCO IOS NETWORK SECURITY (IINS V2.0) VERSION: Presents: 1.
Computer Security: Chapter 5 Operating Systems Security.
Instructor Materials Chapter 2: Scaling VLANs
Protecting Memory What is there to protect in memory?
Protecting Memory What is there to protect in memory?
Protecting Memory What is there to protect in memory?
Chapter 2: System Structures
Operating System Structure
Oracle Solaris Zones Study Purpose Only
Chapter 2: Scaling VLANs
What is an Operating System?
OS Virtualization.
VLAN Trunking Protocol
HC Hyper-V Module GUI Portal VPS Templates Web Console
Computer-System Architecture
Operating Systems.
Chapter 33: Virtual Machines
Computer Security: Art and Science, 2nd Edition
Xen and the Art of Virtualization
In Today’s Class.. General Kernel Responsibilities Kernel Organization
Chapter 33: Virtual Machines
Presentation transcript:

© 2004 IBM Corporation IBM ^ z/VM Design considerations > Security > Performance (SIE)

© 2004 IBM Corporation IBM ^ z/VM Design considerations -Security > Virtual Memory > Dedicated Device separation > Shared Devices > System Security > Networkd

© 2004 IBM Corporation IBM ^ z/VM Design considerations – Virtual memory > VM provides a dynamic address translation (DAT) capability > CP creates separate address spaces for each virtual server. > CP creates f tables that contain detailed information for each real- memory pages the VM uses. > DAT hardware uses these tables to convert virtual-memory addresses to real-memory addresses. > CP maintains the tables in its own address space, the VM can’t access the tables and therefore can’t access the memory that CP or another virtual machine uses. > Sharing memory in z/VM require additional authorization

© 2004 IBM Corporation IBM ^ z/VM Design considerations - Virtual memory > SIE takes DAT a step further by supporting address translation while in SIE. > A VM running under z/VM constructs its own address-translation tables (as usual) to manage memory for its own processes. > What the guest OS considers “real Memory” is in fact virtual memory as well, defined by another set of translation tables CP manages. > If an application running in a VM were able to compromise its the VM's OS, -the damage would be limited to that one VM - because of the separate layer of protection provided by System z hardware and z/VM. ( table for VM are in the CP address space)

© 2004 IBM Corporation IBM ^ z/VM Design considerations- Virtual memory A z/VM system administrator, CP can use DAT to share one or more real memory pages among multiple VMs.. This shared memory helps use real memory more efficiently by reducing the number of duplicated page frames. The Shared memory can be read-only or read-write, containing code and/or data, that many VMs can access. For example, Vms can share application binaries in order to reduce the demand for real memory. All the CP-managed DAT tables will all point to the same page frames in real memory. Additional hardware memory-protection mechanisms will ensure an unauthorized virtual server can’t alter shared, read-only memory

© 2004 IBM Corporation IBM ^ z/VM Design considerations - Virtual Devices A primary function of CP is to control access to real devices in different ways, depending on whether the device is: - shared between two or more virtual servers simultaneously, or -for the exclusive use of a single virtual server. When a virtual server makes an I/O request, CP intercepts the request and - translates virtual-memory addresses to real-memory addresses. - examines the I/O request so no potentially harmful device- maintenance requests or device-subsystem functions are performed - Once validated, CP performs the I/O operation on behalf of the virtual server.

© 2004 IBM Corporation IBM ^ z/VM Design considerations - Mini-Disks DASD devices can be partitioned into multiple units called mini-disks Each mini-disk appears as a separate disk volumes to the VMs. -A mini-disk can be as small as a single block or cylinder, or may cover an entire DASD volume. -A reference by the virtual server to cylinder 0 might be mapped as, for example, cylinder 100 on the real DASD volume. - CP intercepts all I/O operations, and alters the virtual cylinder or block numbers to their real location. - For data integrity, CP will prefix the I/O request with additional device controls to constrain the I/O operation to the mini-disk - In other cases a VM could be given read-only access to a device, in this case CP inserts commands into I/O request that disables all write-type operations. In this manner, the surrounding control units and devices maintain user- data integrity and privacy

© 2004 IBM Corporation IBM ^ z/VM Design considerations - Virtual Networks To host Linux on System z the virtual-networking capabilities Linux needed were added. Among these is an IEEE 802.1q virtual LAN (VLAN)-aware Ethernet bridge called the Virtual Switch (VSWITCH). When used with a trunk connection to an Ethernet switch, the z/VM system administrator controls the assignment of a VM to a specific VLAN. CP also controls the capability of a virtual server to “sniff” the virtual network and to talk to other servers on the virtual network.

© 2004 IBM Corporation IBM ^ z/VM Design considerations – What's a VLAN? In a regular LAN (as implemented on a non-blocking switch for example) all processors: 1) can communicate with each other 2) a broadcast message goes to all processors and 3) a processor can monitor all messages A VLANs allows such a LAN to be broken up into multiple Virtual LAN where each processor in a VLAN can do 1,2,and 3 above ONLY to other processors in it's VLAN. VLANs are isolated form each other

© 2004 IBM Corporation IBM ^ z/VM Design considerations – Commands VM's make requests to CP in one of two ways: - a person or automation tool may issue CP commands from the VM console or - programs running in the virtual server may (if authorized by the VM OS), communicate with CP using the DIAGNOSE instruction. - Parameters passed with the DIAGNOSE instruction provide all of the details CP requires to obtain input and return a response. - The CP command set and the various functions the DIAGNOSE instruction provides are divided into privilege classes. - The set of general user commands and functions intended for all VM server use (such as the capability to IPL (boot) an OS, link to mini-disks, and to create and delete virtual I/O devices) is confined to the single privilege class G. By design, none of the class G commands can affect CP or other VM's.

© 2004 IBM Corporation IBM ^ z/VM Design considerations- Commands - If a VM attempts to use a CP command or DIAGNOSE instruction that’s outside its privilege class, the system rejects the command and an error condition is returned to the VM. - The elemental nature of z/VM’s system integrity implementation prevents a virtual machine from obtaining more privilege classes than the z/VM system administrator assigned - The system administrator may assign additional privilege classes, depending on the virtual server’s need and function, but additional privileges should be given only to trusted and secure virtual servers. - Some of the additional CP commands that will be made available are designed to alter CP or real hardware resources, such as CPUs or I/O devices, and may affect the security and integrity of the system as a whole.

© 2004 IBM Corporation IBM ^ z/VM Design considerations – Command Classes > z/VM privilege classes are designed with the organizational hierarchy of a typical computing installation in mind. >If the privilege classes IBM has assigned to each command and function don’t meet the needs of a particular installation, the system administrator can change them. > It’s possible to define up to 32 privilege classes that partly or completely override the default privilege-class structure. > In this way, a VM can be given access to a specific subset of privileged commands and functions without giving access to all other CP commands and functions that are, by default, in the same privilege class.

© 2004 IBM Corporation IBM ^ z/VM Design considerations – Login Security A well-defined authentication and authorization scheme maintains the security of a z/VM system. The system administrator pre-defines every VM and gives each one a name known as the user ID and an associated password. Unless the system administrator enables anonymous access, CP and the networking daemons challenge anyone providing a VM user ID to provide the matching password. Once the password has been verified and the user has entered the system, all requests to CP to access system resources are based on the VM user ID.

© 2004 IBM Corporation IBM ^ z/VM Design considerations – System Security >Virtual servers make requests to CP in one of two ways: - CP commands from the VM console or - authorized programs in the VM by the OS, communicate via a DIAGNOSE instruction. The parameters passed provide all of the Input required by CP to get a response >The CP command set and the functions of the DIAGNOSE instruction provides are divided into functional groups called privilege classes. >The set of general user commands and functions intended for all virtual server use— e.g. to IPL (boot) an OS, link to mini-disks, and to create and delete virtual I/O devices, is confined to the single privilege class G. > Class G commands cannot affect CP or other virtual servers.

© 2004 IBM Corporation IBM ^ z/VM Design considerations - System Security >If a VM attempts to use a CP command or DIAGNOSE instruction that’s outside its privilege class, the system rejects the command and an error condition is returned to the virtual server. >This feature of z/VM’s system integrity implementation prevents a virtual machine from obtaining more than it's assigned privilege classes. >The system administrator may assign additional privilege classes, but additional privileges should be given only to trusted and secure VMs >Some of the additional CP commands that can be made available are designed to alter CP or real hardware resources, such as CPUs or I/O devices, and may affect the security and integrity of the system as a whole.

© 2004 IBM Corporation IBM ^ z/VM Design considerations - System Security > z/VM privilege classes are designed with a typical computing installation in mind. > If the existing structure doesn't meet the needs of a particular installation, the system administrator can change them > It’s possible to define up to 32 privilege classes that partly or completely override the default privilege-class structure. > In this way, a VM can be given access to a specific subset of privileged commands and functions without giving access to all other commands and functions that are in the same privilege class.

© 2004 IBM Corporation IBM ^ z/VM Design considerations - Security A z/VM customer can add an external security manager (ESM) product—such as the RACF* Security Server feature for z/VM—to augment CP’s native security capabilities. >The ESM offloads many security functions to a separate subsystem, allowing the administrator to implement various access rules and groups and simplify user administration. >It provides more granular authorization and auditing capabilities than are available without an ESM. IBM recommends z/VM customers obtain and use the ESM of their choice.

© 2004 IBM Corporation IBM ^ z/VM Design considerations >

© 2004 IBM Corporation IBM ^ z/VM Design considerations >