Download presentation
Presentation is loading. Please wait.
Published byBriana Wells Modified over 9 years ago
1
Cloud Operating System Unit 12 Cloud System Management I M. C. Chiang Department of Computer Science and Engineering National Sun Yat-sen University Kaohsiung, Taiwan, ROC Cloud Operating System
2
Outline Out of the Machine IDC Management Based on the Machine Service Availability Virtual Machine Management The Management Tool: libvirt Snapshot and Checkpoint Live Migration Virtual Machine Security Rootkit Summary 9/4/2015 Cloud Operating System - Unit 12: Cloud Management U12-2
3
Out of the Machine Cloud is not only the Cloud on the network. Plenty of elements support the Cloud. Server Power Supplies Air Conditioner Staff Members etc. Virtual is built on reality. 9/4/2015 Cloud Operating System - Unit 12: Cloud Management U12-3
4
IDC Management Comfortable environment for machines. Temperature, humidity level. Prevents from natural disasters. Flood, earthquake. Prevents from power failure. UPS. Prevents from microwaves. Well-planned escape. Guarded entrance. Limited use of data storage media. Circumstance in movie “Transformers”. 9/4/2015 Cloud Operating System - Unit 12: Cloud Management U12-4
5
Based on the Machine Eventually, what customers concern is the services provided. Here are some important issues. Customers think what Cloud should be. Maintainers think what help Cloud to be. 9/4/2015 Cloud Operating System - Unit 12: Cloud Management U12-5
6
Service Availability (1) Very important for all services Amazon EC2 guarantees at least 99.95% availability in agreement (about 262.8 minutes down time at most in a year) Google App Engine guarantees same service level agreement Both provide refund if the requirements are not met 9/4/2015 Cloud Operating System - Unit 12: Cloud Management U12-6
7
Service Availability (2) Possibly methods of increasing availability Providing virtual machine instance snapshots Can backup VM’s state Providing virtual machine live migration Can move the virtual machine to another physical machine on the fly Redundant storage data In different physical storages and different place. 9/4/2015 Cloud Operating System - Unit 12: Cloud Management U12-7
8
Virtual Machine Management Most IaaS solutions aren’t bound with hypervisors Can use different hypervisors in clouds Manage instances will be an issue A cloud is composited with many hosts, increasing even more complexity A common layer for managing all hypervisors with one controlling point Reduce the complexity greatly 9/4/2015 Cloud Operating System - Unit 12: Cloud Management U12-8
9
libvirt - Introductions (1) Initial release: Dec 19, 2005 Most recent stable release: Feb 13, 2012 An open source API, daemon and management tools are included Aiming for “being a building block for higher level management tools” 9/4/2015 Cloud Operating System - Unit 12: Cloud Management U12-9
10
libvirt - Introductions (2) Supported by Red Hat Writing in C Binding with C#, Python, Perl, OCaml, Ruby, Java, PHP Support hypervisor: KVM, Xen, VMWare, MS Hyper-V, etc. 9/4/2015 Cloud Operating System - Unit 12: Cloud Management U12-10
11
libvirt - Introductions (3) 9/4/2015 Cloud Operating System - Unit 12: Cloud Management U12-11
12
libvirt - Features (1) VM Management Including provision, create, modify, monitor, control, migrate, and stop instances Instance resources management Network interfaces and firewall setup Storage management Overall instances’ states monitoring Local physical host resource consumption monitoring. 9/4/2015 Cloud Operating System - Unit 12: Cloud Management U12-12
13
libvirt - Features (2) Remote management Using TLS encryption and x509 certificates Authenticating with Kerberos and SASL Provides secure remote control Portable client API for multiple OSs Including Linux, Solaris, and Windows 9/4/2015 Cloud Operating System - Unit 12: Cloud Management U12-13
14
libvirt – Operation Modes libvirt has two operation modes. Local use libvirt API directly Remote executes extra libvirtd allows user to access hypervisors on remote machine through authenticated connections 9/4/2015 Cloud Operating System - Unit 12: Cloud Management U12-14
15
libvirt – Tools Based on It virsh An interactive CLI including in libvirt Virtual Machine Manager An GUI developed by Red Hat oVirt Web application for virtual machines management. Developed by Red Hat as well And more than 20 projects base or use libvirt 9/4/2015 Cloud Operating System - Unit 12: Cloud Management U12-15
16
libvirt – Supported by Xen (1) 9/4/2015 Cloud Operating System - Unit 12: Cloud Management U12-16
17
libvirt – Supported by Xen (2) Programs using libvirt execute in Dom0. libvirt can be initialized in two ways, each has their methods to connect to the Xen infrastructure. With root access, use virConnectOpen(). Connect to the Xen Daemon through an HTTP RPC layer. A read/write ocnnection to the XenStore. Use Xen Hypervisor calls. Without root access, use virConnectOpenReadOnly(). Fork a libvirt_proxy program (running as root) to provide read_only access to the API. Be useful for reporting and monitoring. 9/4/2015 Cloud Operating System - Unit 12: Cloud Management U12-17
18
Snapshot and Checkpoint (1) Not only the disk image File-based representation of the state, data and hardware configuration of whole VM Can “freeze” the virtual machine in some particular states, then resume the execution Useful for system forensics, or restore the whole system back after failed upgrade/patch 9/4/2015 Cloud Operating System - Unit 12: Cloud Management U12-18
19
Snapshot and Checkpoint (2) Difference between “snapshot” and “checkpoint” Different definitions in different hypervisors Xen Only “checkpoint” Microsoft Hyper-V “snapshot” for long-term backup “checkpoint” for short term recovery VMWare Only “snapshot” 9/4/2015 Cloud Operating System - Unit 12: Cloud Management U12-19
20
Snapshot - Creation With the CLI command, making snapshots can be scheduled and executed automatically Different command for different hypervisor of course Xen xl save [OPTIONS] VMWare Workstation vmrun snapshot [OPTIONS] With help of libvirt: All can be done with “virsh snapshot-create [OPTIONS]” 9/4/2015 Cloud Operating System - Unit 12: Cloud Management U12-20
21
Live Migration (1) Snapshot can make backups for disaster recovery If host needs maintenance, we have to move virtual machine from host to host on the fly for minimizing downtime Live migration can be seamless from end-users Two ways of migration Pre-copy memory Post-copy memory 9/4/2015 Cloud Operating System - Unit 12: Cloud Management U12-21
22
Live Migration (2) Pre-copy memory migration implementation Warm-up Copy the current memory pages to destination If pages change, re-copy them until the rate is less than given rate Stop-and-copy Stop the source VM and copy the remaining dirty pages to target VM. Downtime happens here. Could be milliseconds to seconds, depends on memory size. 9/4/2015 Cloud Operating System - Unit 12: Cloud Management U12-22
23
Live Migration (3) Post-copy memory migration implementation Suspending the source VM first, then copy the minimal execution state of the VM to the destination Including CPU, registers, and non-pageable memory After copying the state the VM at destination start running What about the memory? Each time the page that haven’t transferred it generates page-faults. The page-faults will be handled by hypervisor, and copy from the source through network. 9/4/2015 Cloud Operating System - Unit 12: Cloud Management U12-23
24
Live Migration (4) Pre-Copy Need warm-up stage for copying most pagetable Longer downtime depends on the VM’s workload From 60ms to 210ms* Post-Copy Even less downtime than pre-copy Performance impact after migration Demand-paging mechanism reduce the performance impact 9/4/2015 Cloud Operating System - Unit 12: Cloud Management U12-24
25
VM Security Virtual machine monitor security is recently the most important issue for Cloud Computing. All virtual machines controlled by VMM. VMM is the bridge between virtual machines and the hardware. Hard disk Memory CPU, etc. Theoretically, a virtual machine is a completely isolated guest operating system installation. 9/4/2015 Cloud Operating System - Unit 12: Cloud Management U12-25
26
VM Security – Virtual Machine Escape What is virtual machine escape? The process of breaking out of a virtual machine and interacting with the host OS. The first discovery of virtual machine escape. 2008, within VMWare By Core Security Technologies CVE-2008-0923 Allows guest OS users to read and write arbitrary files on the host OS. 9/4/2015 Cloud Operating System - Unit 12: Cloud Management U12-26
27
VM Security – VMWare (1) The number of security vulnerabilities in record 154 due to 2012/04/02 The oldest record CVE-1999-0733 Miss Buffer overflow in VMWare 1.0.1 for Linux. Method Uses a long HOME environmental variable. 9/4/2015 Cloud Operating System - Unit 12: Cloud Management U12-27
28
VM Security – VMWare (2) The newest record CVE-2012-1515 Miss VMWare ESX/ESXi 3.5, 4.0 and 4.1 do not implement port- based I/O operations properly. Effect Allows guest OS users to gain guest OS privileges. Method Overwrites memory locations in a read-only memory block associated with the Virtual DOS Machine. 9/4/2015 Cloud Operating System - Unit 12: Cloud Management U12-28
29
VM Security – Xen (1) The number of security vulnerabilities in record 9 due to 2012/04/02 The newest record CVE-2009-3525 Miss tools/libxc/xc_dom_bzimageloader.c in Xen 3.2, 3.3, 4.0 and 4.1 Effect Allows local users to cause a DoS Method Unspecified vectors related to “Lack of error checking in the decompression loop” 9/4/2015 Cloud Operating System - Unit 12: Cloud Management U12-29
30
VM Security – Xen (2) The oldest record CVE-2008-4405 Miss xend in Xen 3.0.3 does not properly limit the contents of the /local/domain/xenstore directory tree restrict a guest VM’s write access within the directory tree Effect Allows guest OS users to cause a DoS 9/4/2015 Cloud Operating System - Unit 12: Cloud Management U12-30
31
VM Security – Hyper-V The number of security vulnerabilities in record 3 due to 2012/04/02 All allow users to cause a DoS CVE-2010-0026 Host OS hang Via a crafted application that executes a malformed series of machine instructions. CVE-2010-3960 host OS hang By sending a crafted encapsulated packet over the VMBus. CVE-2011-1872 host OS infinite loop Via malformed machine instructions in a VMBus packet. 9/4/2015 Cloud Operating System - Unit 12: Cloud Management U12-31
32
VM Security - OpenStack The number of security vulnerabilities in record 2 due to 2012/04/02 CVE-2011-4596 When enabling EC2 API and the S3/RegisterImage image-registration method, allow remote authenticated users to overwrite arbitrary files. CVE-2012-0030 When using OpenStack API, allow remote authenticated uses to bypass access restrictions for tenants of other users. 9/4/2015 Cloud Operating System - Unit 12: Cloud Management U12-32
33
VM Security – About Vulnerability Top 3 of vulnerability types Execute Code Denial of Service SQL Injection Information resource http://www.cvedetails.com http://www.cvedetails.com supplies the records above http://www.cve.mitre.org http://www.cve.mitre.org http://nvd.nist.gov http://nvd.nist.gov 9/4/2015 Cloud Operating System - Unit 12: Cloud Management U12-33
34
VM Management – Rootkit What is a rootkit? A tool for getting root or cleaning the invade history. A kind of malicious software. In order to hide the existence of certain processes. It is nice, before. Sony BMG copy protection rootkit scandal. Trojan can be seen as a rootkit. 9/4/2015 Cloud Operating System - Unit 12: Cloud Management U12-34
35
Rootkit - Examples We have already known that a rootkit is a software which intends to get the control of the computer Here are two VMBRs (Virtual-Machine Based Rootkit). SubVirt Blue Pill 9/4/2015 Cloud Operating System - Unit 12: Cloud Management U12-35
36
Rootkit– SubVirt (1) Proposed by team of Microsoft Research and University of Michigan on 2006. The procedure of infection. We assume that SubVirt has the administrator authority. After rebooting, SubVirt should be executed first. SubVirt starts VMM and runs the original operating system as a virtual machine on VMM. SubVirt can collects the wanted information. 9/4/2015 Cloud Operating System - Unit 12: Cloud Management U12-36
37
Rootkit– SubVirt (2) 9/4/2015 Cloud Operating System - Unit 12: Cloud Management U12-37
38
Rootkit– Blue Pill (1) Designed by Joanna Rutkowska. First demonstrated at the Black Hat Briefings on August 3, 2006. Originally it required AMD-V support, but was ported to Intel VT-x as well. It will start a thin hypervisor and virtualize the rest of the machine under it. The machine doesn’t need to be restarted. 9/4/2015 Cloud Operating System - Unit 12: Cloud Management U12-38
39
Rootkit– Blue Pill (2) 9/4/2015 Cloud Operating System - Unit 12: Cloud Management U12-39
40
Summary Cloud is not only what user see. Snapshot and checkpoint can help to retain the service availability. There are two ways for live migration: Pre-copy memory Post-copy memory Services based on virtual machines, and virtual machines managed by hypervisors, so the security of hypervisors is important. 9/4/2015 Cloud Operating System - Unit 12: Cloud Management U12-40
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.