SlideShare a Scribd company logo
Lars Kurth
Community Manager, Xen Project
Chairman, Xen Project Advisory Board
Director, Open Source, Citrix
larskurth
Presentation on xenbits.xenproject.org/people/larsk/
Cheng Zhang
Software Engineer, Citrix
Currently working for XenServer Livepatch
integration and new packaging framework
aiwei2013214
Simon Crosby, XenSource Inc.
Xen Project: www.xenproject.org
XenServer: www.xenserver.org
LCC17 -  Live Patching, Virtual Machine Introspection and Vulnerability Management - Lars Kurth & Cheng Zhang, Citrix
LCC17 -  Live Patching, Virtual Machine Introspection and Vulnerability Management - Lars Kurth & Cheng Zhang, Citrix
A new way to protect against malware
2007 2009 2011 2013 2015 2017
Enablers: from xenaccess/xenprobes to LibVMI
Interesting research topic
Originally used for forensics (too intrusive for server virt)
AA A
Xenaccess/Xenprobes LibVMI
VMI: enabling commercial applications
Hardware assisted VMI solves the intrusion problem
Collaboration between: Zentific, Citrix, Bitdefender, Intel and others
VMI:
HW Support (EPT, …)
ARM, alt2pm, ..
C CC
VM3
Guest OS
App
VMn
Guest OS
App
VM2
Guest OS
App
Dom0
Dom0 Kernel
Drivers Agent(s) Agent(s) Agent(s)
Installed in-guest agents, e.g. anti-virus software,
VM disk & memory scanner, network monitor, etc.
Can be disabled by rootkits and advanced
persistent threats (APT)
Several
VM3 VMnVM2Dom0
Dom0 Kernel
Drivers
VM3
Guest OS
App
VMn
Guest OS
App
VM2
Guest OS
App
Security
Appliance
VM1
Introspection
Engine
Protected area
authentication mechanism to protect the IF
Uses HW extensions to monitor memory (e.g. Intel EPT) è Low Intrusion
Register rules with Xen to trap on and inspect suspicious activities
(e.g. execution of memory on the dynamic heap)
All malware need an attack technique to gain a foothold
Attack techniques exploit specific software bugs/vulnerability
The number of available attack techniques is small
Buffer Overflows, Heap Sprays, Code Injection, API Hooking, …
Because VMI protects against attack techniques
It can protect against entirely new malware
Verified to block these advanced attacks in real-time
APT28, Energetic Bear, DarkHotel, Epic Turla, Regin, ZeuS, Dyreza, EternalBlue1
… solely by relying on VMI
WannaCry/EternalBlue blocked in real installations
1 businessinsights.bitdefender.com/hypervisor-introspection-defeated-enternalblue-a-priori
Rootkits & Advanced Persistent Threats
Exploit 0-days in Operating Systems/System Software
Can disable agent based security solutions (mask their own existence)
VMI solutions operate from outside the VM
Thus, it cannot be disabled using traditional attack vectors
BUT:
VMI is not a replacement, for traditional security solutions
It is an extra tool that can be used to increase protection
Pratap Sankar @ Flickr
Documentation
wiki.xenproject.org/wiki/Virtual_Machine_Introspection
Products
Bitdefender HVI
XenServer
www.bitdefender.com
Protection & Remedial
Monitoring & Admin
Citrix Ready
Zentific Zazen (June 17)
Xen & XenServer & …
www.zentific.com
Protection & Remedial
Monitoring & Admin
Forensics & Data gathering
Malware analysis
AIS Introvirt
XenServer
www.ainfosec.com
A tale of close collaboration within
the Xen Project Community
2015 2016 2017
4.84.7 P
Why did we develop Live Patching?
Cloud reboot affected AWS, Rackspace, IBM SoftLayer and others
Deploying security patches may require reboots; Inconveniences users
How did we fix this?
2015: Design with input from AWS, Alibaba, Citrix, Oracle and SUSE
2016: Xen 4.7 came with Live Patching for x86
2016: Xen 4.8 added extra x86 use-cases and ARM support
2017: XenServer 7.1 releases Live Patching in first commercial product
D
10% 1%
const char *xen_extra_version(void)
{
return XEN_EXTRAVERSION;
}

push %rbp
mov %rsp,%rbp
lea 0x16698b(%rip),%rax
leaveq
retq
const char *xen_extra_version(void)
{
return “Hello World”;
}

push %rbp
mov %rsp,%rbp
lea 0x29333b(%rip),%rax
leaveq
Retq
Replacing compiled functions with new code, encoded in an ELF file called
payload, while the hypervisor is running without impacting running guests.
Design: xenbits.xenproject.org/docs/unstable/misc/livepatch.html
The exact source tree used to
build the running Xen instance.
The .config from the original
build of Xen.
A build-id onto which the
livepatch will be applied.
A source patch.
livepatch-
build-
tools
The exact same
compilation toolchain
used to build the
running Xen.
Livepatch
payload
Supports stacking of different payloads; payloads depend on build-id
Functionality:
list: lists loaded and applied live patches
upload: load & verify a live patch
unload: unload a live patch
apply: apply a live patch
revert: un-apply a live patch Xen 4.8.1
XSA 213
XSA 214
XSA 215
Depends on
build-id of 4.8.1
Depends on
build-id of XSA 213
Depends on
build-id of XSA 214
Target
Dom0 &
Guest
Linux
Kernel
Hypervisor
Technology
Kernel
Live Patching
kPatch
(RedHat)
Xen
LivePatch
kSplice
(Oracle)
kGraft
(SUSE)
Function +
Data
✔
✔
✔ Xen 4.7
✔
✔
Inline
patching
✗
✗
✗ Future
✔
✗
Data
Structures
✗
✔ via hooks
✔
✔
✗
Xen 4.8
via hooks
XenServer
LivePatch
Integrates
different solutions
into a single user
experience
For Dom0
(CentOS)
For Xen
Source patches
+ other
build artifacts
Hot Fixes contain
Per valid patch level: a Xen or Dom0 Live Patch
Matching RPMs for most recent patch level
In case of a reboot or for Xen/Dom0 not capable of Live Patching
Extensive Verification and Validation:
The process of patching a live hypervisor or kernel
is not an easy task. What happens is a little bit like open
heart surgery. The patient is the hypervisor and/or Dom0
itself, and precision and care are needed to get things right.
One wrong move and it is game over.
Live
Patch
Live
Patch
Live
Patch
build
for each
patch level
package
Hot Fix
LPsRPMs
RPMRPMRPM
build
for most recent
patch level
Hot Fix
LPsRPMs
Publication
SigningValidation
Verification
Q&A
(livepatch-build
or kpatch-build)
(iso)
XAPI
Toolstack
Hot Fix
LPsRPM
downloadHot Fix
LPsRPM
Dom0
Dom0 Kernel
(CentOS)
Hypervisor
XenCenter
or xe
Initiates
host update
SysAdmin
Running System
instance that supports
live patching
Disk
updates
(such that
after reboot
the patches
are applied)
works out
correct LP
& updates
(using native
live patching
tools or APIs)
Pratap Sankar @ Flickr
xenbits.xenproject.org/people/larsk/LCC17 - Build LivePatch.mp4
xenbits.xenproject.org/people/larsk/LCC17 - Apply LivePatch.mov
LCC17 -  Live Patching, Virtual Machine Introspection and Vulnerability Management - Lars Kurth & Cheng Zhang, Citrix
LCC17 -  Live Patching, Virtual Machine Introspection and Vulnerability Management - Lars Kurth & Cheng Zhang, Citrix
LCC17 -  Live Patching, Virtual Machine Introspection and Vulnerability Management - Lars Kurth & Cheng Zhang, Citrix
Pratap Sankar @ Flickr
Xen Project LivePatch Specification & Status
xenbits.xenproject.org/docs/unstable/misc/livepatch.html
wiki.xenproject.org/wiki/LivePatch
Xen Project LivePatch Presentations & Videos
xenbits.xenproject.org/people/larsk/FOSDEM17-LivePatch.pdf (Short)
people/larsk/XPDS16-LivePatch.pdf (Long)
Xen Project LivePatch Videos
fosdem.org/2017/schedule/event/iaas_livepatxen/
XenServer
xenserver.org
Industry-leading vulnerability management
LCC17 -  Live Patching, Virtual Machine Introspection and Vulnerability Management - Lars Kurth & Cheng Zhang, Citrix
Vulnerability data from cvedetails.com
0
50
100
150
200
250
300
350
2017* 2016 2015 2014 2013 2012
n Xen Project
n Linux Kernel
n QEMU/KVM
*) Data up to May 31st, 2017
R: Vulnerability reported to security@xenproject.org
P: Vulnerability pre-disclosed on xen-security-issues@lists.xenproject.org
R P
Fixing Security Bugs:
Dedicated security team =
security experts from within
the Xen Project Community
Security Team:
Triage
Creation of fix/patches
Can a Livepatch can be created?
No? If possible, re-write fix/patches
Validation of fix/patches
Assignment of CVE
Issue description and risk analysis
AR P
Fix their systems/software:
Eligible Xen Project Users
are informed under embargo
of the vulnerability
Eligible Users = Pre-disclosure list members:
Product Companies, Open Source & Commercial Distros (e.g. Huawei, Debian)
Service/Cloud Providers (e.g. Alibaba)
Large Private Downstream (e.g. Google)
Allowed to share information via
xen-security-issues- discuss@lists.xenproject.org
R: Vulnerability reported to security@xenproject.org
P: Vulnerability pre-disclosed on xen-security-issues@lists.xenproject.org
A: Vulnerability announced on xen-announce@lists.xenproject.org & xenbits.xen.org/xsa
A XR P
General Publication:
Information about
vulnerability is made public
Everyone else:
Patches their systems either through
security updates from distros/products or
builds them from source.
Users of service/cloud providers will
not be impacted
R: Vulnerability reported to security@xenproject.org
P: Vulnerability pre-disclosed on xen-security-issues@lists.xenproject.org
A: Vulnerability announced on xen-announce@lists.xenproject.org & xenbits.xen.org/xsa
A XR P
Responsible Disclosure: fix critical systems/software before publication
R: Vulnerability reported to security@...
P: Vulnerability pre-disclosed to eligible users
A: Vulnerability announced publicly
F: Fix available
Full Disclosure, immediate (no-fix): public disclosure without a fix
A XR F
A XR
Full Disclosure, post-fix: public disclosure with a fix
F
F
4) http://oss-security.openwall.org/wiki/mailing-lists/distros
5) http://www.openwall.com/lists/oss-security
6) No Chinese companies or distros on pre-disclosure list
7) Only handles x86 KVM bugs (no ARM or other bugs)
1) Is the CVE severity used to handle vulnerabilities differently?
2) Days embargoed (information is secret)
3) D = Distros/Products, S = Public Service, P = Private Downstream
Responsible only
Days 2 Who? 3FOSS Project Bug Severity 1 Process Type
14-19 D 6
Linux Kernel via
OSS security distros 4 ≥ Medium – Critical Responsible Disclosure
14-19 D 6
QEMU/KVM via
OSS security distros 4
OSS security 5
≥ Medium – Critical
≤ Low
Responsible Disclosure 7
Full Disclosure, no-fix
3-5 D, S, POpenStack OSSA
OpenStack OSSN
≥ Medium – Critical
≤ Low
Responsible Disclosure
Full Disclosure, post-fix
Xen Hypervisor
Includes Linux & QEMU
vulnerabilities in supported Xen
configurations
Low – Critical Responsible Disclosure 14 D, S, P
14-19 D 6
Linux Kernel via
OSS security distros 4
OSS security 5
≥ Medium – Critical
≤ Low
Responsible Disclosure
Full Disclosure, no-fix
Picture by Lars Kurth
Only Hypervisor with VMI
Protection from new classes of malware
Several security companies working with XenServer
Live Patching
Disruption free application of vulnerabilities
Used by several cloud providers
Used best in commercial products, e.g. XenServer
Industry Leading Vulnerability Process
Includes QEMU and Kernel XSAs
Designed with input from Cloud Providers
Stable number of CVEs
BUT: the Xen Project cannot today distribute XSAs
as Live Patches (the project delivers source code only)
Sys Admins
Extra protection = extra piece of mind
Picture by Lars Kurth
xenbits.xenproject.org/people/larsk
You can also contact Patrick Zhang (patrick.zhang@citrix.com)

after the presentation
Picture by Lars Kurth

More Related Content

PDF
LCC17 - Securing Embedded Systems with the Hypervisor - Lars Kurth, Citrix
PDF
Rootlinux17: Hypervisors on ARM - Overview and Design Choices by Julien Grall...
PDF
XPDDS18: The Evolution of Virtualization in the Arm Architecture - Julien Gra...
PDF
Xen Project 15 Years down the Line
PDF
Rootlinux17: An introduction to Xen Project Virtualisation
PPTX
XPDDS18: Design Session - SGX deep dive and SGX Virtualization Discussion, Ka...
PDF
XPDDS18: CPUFreq in Xen on ARM - Oleksandr Tyshchenko, EPAM Systems
PPTX
XPDDS18: Windows PV Drivers Project: Status and Updates - Paul Durrant, Citri...
LCC17 - Securing Embedded Systems with the Hypervisor - Lars Kurth, Citrix
Rootlinux17: Hypervisors on ARM - Overview and Design Choices by Julien Grall...
XPDDS18: The Evolution of Virtualization in the Arm Architecture - Julien Gra...
Xen Project 15 Years down the Line
Rootlinux17: An introduction to Xen Project Virtualisation
XPDDS18: Design Session - SGX deep dive and SGX Virtualization Discussion, Ka...
XPDDS18: CPUFreq in Xen on ARM - Oleksandr Tyshchenko, EPAM Systems
XPDDS18: Windows PV Drivers Project: Status and Updates - Paul Durrant, Citri...

What's hot (20)

PDF
ALSF13: Xen on ARM - Virtualization for the Automotive Industry - Stefano Sta...
PDF
BSDCan 2015: How to Port BSD as a Xen on ARM Guest
PDF
XPDS14: Porting FreeRTOS to Xen on the ARM Cortex A15 - Jonathan Daugherty, G...
PDF
XPDDS19: Argo and Hypervisor-Mediated Data eXchange (HMX) - Christopher Clark...
PDF
XPDS16: Xenbedded: Xen-based client virtualization for phones and tablets - ...
PPTX
ALSS14: Xen Project Automotive Hypervisor (Demo)
PDF
2018 Genivi Xen Overview Nov Update
PPTX
LinuxCon Japan 13 : 10 years of Xen and Beyond
PDF
Bare-Metal Hypervisor as a Platform for Innovation
PDF
XPDS16: CPUID handling for guests - Andrew Cooper, Citrix
PDF
Unikraft Landing Page Master Slides
PDF
LFCollab14: Xen vs Xen Automotive
PDF
ARM Architecture-based System Virtualization: Xen ARM open source software pr...
PDF
HKG18- 115 - Partitioning ARM Systems with the Jailhouse Hypervisor
PDF
Fosdem 18: Securing embedded Systems using Virtualization
PDF
XPDS14 - Xen on ARM: Status and Performance - Stefano Stabellini, Citrix
PDF
LCA13: Xen on ARM
PDF
XPDDS18: Unikraft: An easy way of crafting Unikernels on Arm - Kaly Xin, ARM
PDF
XPDS16: AMD's virtualization memory encryption technology - Brijesh Singh, A...
PDF
LCNA14: Why Use Xen for Large Scale Enterprise Deployments? - Konrad Rzeszute...
ALSF13: Xen on ARM - Virtualization for the Automotive Industry - Stefano Sta...
BSDCan 2015: How to Port BSD as a Xen on ARM Guest
XPDS14: Porting FreeRTOS to Xen on the ARM Cortex A15 - Jonathan Daugherty, G...
XPDDS19: Argo and Hypervisor-Mediated Data eXchange (HMX) - Christopher Clark...
XPDS16: Xenbedded: Xen-based client virtualization for phones and tablets - ...
ALSS14: Xen Project Automotive Hypervisor (Demo)
2018 Genivi Xen Overview Nov Update
LinuxCon Japan 13 : 10 years of Xen and Beyond
Bare-Metal Hypervisor as a Platform for Innovation
XPDS16: CPUID handling for guests - Andrew Cooper, Citrix
Unikraft Landing Page Master Slides
LFCollab14: Xen vs Xen Automotive
ARM Architecture-based System Virtualization: Xen ARM open source software pr...
HKG18- 115 - Partitioning ARM Systems with the Jailhouse Hypervisor
Fosdem 18: Securing embedded Systems using Virtualization
XPDS14 - Xen on ARM: Status and Performance - Stefano Stabellini, Citrix
LCA13: Xen on ARM
XPDDS18: Unikraft: An easy way of crafting Unikernels on Arm - Kaly Xin, ARM
XPDS16: AMD's virtualization memory encryption technology - Brijesh Singh, A...
LCNA14: Why Use Xen for Large Scale Enterprise Deployments? - Konrad Rzeszute...
Ad

Similar to LCC17 - Live Patching, Virtual Machine Introspection and Vulnerability Management - Lars Kurth & Cheng Zhang, Citrix (20)

PDF
OSSA17 - Live patch, VMI, Security Mgmt (50 mins, no embedded demos)
PDF
Xen Project Weather Report (Aug 2015 Edition)
PPTX
LFCOLLAB15: Xen 4.5 and Beyond
PDF
Platform Security Summit 18: Xen Security Weather Report 2018
PPTX
Scale17x: Thinking outside of the conceived tech comfort zone
PDF
OWF: Xen - Open Source Hypervisor Designed for Clouds
PDF
Xen, XenServer, and XAPI: What’s the Difference?-XPUS13 Bulpin,Pavlicek
PDF
Aplura virtualization slides
PDF
INLINE_PATCH_PROXY_FOR_XEN_HYPERVISOR
PDF
2010 xen-lisa
PDF
XPDSS19: Live-Updating Xen - Amit Shah & David Woodhouse, Amazon
PDF
OSSNA18: Xen Beginners Training
PDF
Oscon 2012 : From Datacenter to the Cloud - Featuring Xen and XCP
PPTX
Hypervisor Security - OpenStack Summit Hong Kong
PDF
XPDS14 - Zero-Footprint Guest Memory Introspection from Xen - Mihai Dontu, Bi...
PDF
LFNW2014 Advanced Security Features of Xen Project Hypervisor
PPTX
LinuxTag13: 10 years of Xen and beyond
PDF
Scale 12x Securing Your Cloud with The Xen Hypervisor
PDF
Xen in Linux (aka PVOPS update)
PDF
Securing your Cloud with Xen - SUSECon 2013
OSSA17 - Live patch, VMI, Security Mgmt (50 mins, no embedded demos)
Xen Project Weather Report (Aug 2015 Edition)
LFCOLLAB15: Xen 4.5 and Beyond
Platform Security Summit 18: Xen Security Weather Report 2018
Scale17x: Thinking outside of the conceived tech comfort zone
OWF: Xen - Open Source Hypervisor Designed for Clouds
Xen, XenServer, and XAPI: What’s the Difference?-XPUS13 Bulpin,Pavlicek
Aplura virtualization slides
INLINE_PATCH_PROXY_FOR_XEN_HYPERVISOR
2010 xen-lisa
XPDSS19: Live-Updating Xen - Amit Shah & David Woodhouse, Amazon
OSSNA18: Xen Beginners Training
Oscon 2012 : From Datacenter to the Cloud - Featuring Xen and XCP
Hypervisor Security - OpenStack Summit Hong Kong
XPDS14 - Zero-Footprint Guest Memory Introspection from Xen - Mihai Dontu, Bi...
LFNW2014 Advanced Security Features of Xen Project Hypervisor
LinuxTag13: 10 years of Xen and beyond
Scale 12x Securing Your Cloud with The Xen Hypervisor
Xen in Linux (aka PVOPS update)
Securing your Cloud with Xen - SUSECon 2013
Ad

More from The Linux Foundation (20)

PDF
ELC2019: Static Partitioning Made Simple
PDF
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...
PDF
XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...
PDF
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...
PDF
XPDDS19 Keynote: Unikraft Weather Report
PDF
XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...
PDF
XPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, Xilinx
PDF
XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...
PDF
XPDDS19: Memories of a VM Funk - Mihai Donțu, Bitdefender
PPTX
OSSJP/ALS19: The Road to Safety Certification: Overcoming Community Challeng...
PPTX
OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...
PDF
XPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, Citrix
PDF
XPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltd
PDF
XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...
PDF
XPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&D
PDF
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM Systems
PDF
XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...
PDF
XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...
PDF
XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...
PDF
XPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSE
ELC2019: Static Partitioning Made Simple
XPDDS19: How TrenchBoot is Enabling Measured Launch for Open-Source Platform ...
XPDDS19 Keynote: Xen in Automotive - Artem Mygaiev, Director, Technology Solu...
XPDDS19 Keynote: Xen Project Weather Report 2019 - Lars Kurth, Director of Op...
XPDDS19 Keynote: Unikraft Weather Report
XPDDS19 Keynote: Secret-free Hypervisor: Now and Future - Wei Liu, Software E...
XPDDS19 Keynote: Xen Dom0-less - Stefano Stabellini, Principal Engineer, Xilinx
XPDDS19 Keynote: Patch Review for Non-maintainers - George Dunlap, Citrix Sys...
XPDDS19: Memories of a VM Funk - Mihai Donțu, Bitdefender
OSSJP/ALS19: The Road to Safety Certification: Overcoming Community Challeng...
OSSJP/ALS19: The Road to Safety Certification: How the Xen Project is Making...
XPDDS19: Speculative Sidechannels and Mitigations - Andrew Cooper, Citrix
XPDDS19: Keeping Coherency on Arm: Reborn - Julien Grall, Arm ltd
XPDDS19: QEMU PV Backend 'qdevification'... What Does it Mean? - Paul Durrant...
XPDDS19: Status of PCI Emulation in Xen - Roger Pau Monné, Citrix Systems R&D
XPDDS19: [ARM] OP-TEE Mediator in Xen - Volodymyr Babchuk, EPAM Systems
XPDDS19: Bringing Xen to the Masses: The Story of Building a Community-driven...
XPDDS19: Will Robots Automate Your Job Away? Streamlining Xen Project Contrib...
XPDDS19: Client Virtualization Toolstack in Go - Nick Rosbrook & Brendan Kerr...
XPDDS19: Core Scheduling in Xen - Jürgen Groß, SUSE

Recently uploaded (20)

PDF
cuic standard and advanced reporting.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Cloud computing and distributed systems.
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Encapsulation theory and applications.pdf
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Big Data Technologies - Introduction.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
cuic standard and advanced reporting.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
NewMind AI Weekly Chronicles - August'25-Week II
sap open course for s4hana steps from ECC to s4
Spectroscopy.pptx food analysis technology
Cloud computing and distributed systems.
Reach Out and Touch Someone: Haptics and Empathic Computing
Dropbox Q2 2025 Financial Results & Investor Presentation
Programs and apps: productivity, graphics, security and other tools
Encapsulation theory and applications.pdf
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Encapsulation_ Review paper, used for researhc scholars
Big Data Technologies - Introduction.pptx
Spectral efficient network and resource selection model in 5G networks
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Digital-Transformation-Roadmap-for-Companies.pptx

LCC17 - Live Patching, Virtual Machine Introspection and Vulnerability Management - Lars Kurth & Cheng Zhang, Citrix

  • 1. Lars Kurth Community Manager, Xen Project Chairman, Xen Project Advisory Board Director, Open Source, Citrix larskurth Presentation on xenbits.xenproject.org/people/larsk/ Cheng Zhang Software Engineer, Citrix Currently working for XenServer Livepatch integration and new packaging framework aiwei2013214
  • 2. Simon Crosby, XenSource Inc. Xen Project: www.xenproject.org XenServer: www.xenserver.org
  • 5. A new way to protect against malware
  • 6. 2007 2009 2011 2013 2015 2017 Enablers: from xenaccess/xenprobes to LibVMI Interesting research topic Originally used for forensics (too intrusive for server virt) AA A Xenaccess/Xenprobes LibVMI VMI: enabling commercial applications Hardware assisted VMI solves the intrusion problem Collaboration between: Zentific, Citrix, Bitdefender, Intel and others VMI: HW Support (EPT, …) ARM, alt2pm, .. C CC
  • 7. VM3 Guest OS App VMn Guest OS App VM2 Guest OS App Dom0 Dom0 Kernel Drivers Agent(s) Agent(s) Agent(s) Installed in-guest agents, e.g. anti-virus software, VM disk & memory scanner, network monitor, etc. Can be disabled by rootkits and advanced persistent threats (APT)
  • 8. Several VM3 VMnVM2Dom0 Dom0 Kernel Drivers VM3 Guest OS App VMn Guest OS App VM2 Guest OS App Security Appliance VM1 Introspection Engine Protected area authentication mechanism to protect the IF Uses HW extensions to monitor memory (e.g. Intel EPT) è Low Intrusion Register rules with Xen to trap on and inspect suspicious activities (e.g. execution of memory on the dynamic heap)
  • 9. All malware need an attack technique to gain a foothold Attack techniques exploit specific software bugs/vulnerability The number of available attack techniques is small Buffer Overflows, Heap Sprays, Code Injection, API Hooking, … Because VMI protects against attack techniques It can protect against entirely new malware Verified to block these advanced attacks in real-time APT28, Energetic Bear, DarkHotel, Epic Turla, Regin, ZeuS, Dyreza, EternalBlue1 … solely by relying on VMI WannaCry/EternalBlue blocked in real installations 1 businessinsights.bitdefender.com/hypervisor-introspection-defeated-enternalblue-a-priori
  • 10. Rootkits & Advanced Persistent Threats Exploit 0-days in Operating Systems/System Software Can disable agent based security solutions (mask their own existence) VMI solutions operate from outside the VM Thus, it cannot be disabled using traditional attack vectors BUT: VMI is not a replacement, for traditional security solutions It is an extra tool that can be used to increase protection
  • 11. Pratap Sankar @ Flickr Documentation wiki.xenproject.org/wiki/Virtual_Machine_Introspection Products Bitdefender HVI XenServer www.bitdefender.com Protection & Remedial Monitoring & Admin Citrix Ready Zentific Zazen (June 17) Xen & XenServer & … www.zentific.com Protection & Remedial Monitoring & Admin Forensics & Data gathering Malware analysis AIS Introvirt XenServer www.ainfosec.com
  • 12. A tale of close collaboration within the Xen Project Community
  • 13. 2015 2016 2017 4.84.7 P Why did we develop Live Patching? Cloud reboot affected AWS, Rackspace, IBM SoftLayer and others Deploying security patches may require reboots; Inconveniences users How did we fix this? 2015: Design with input from AWS, Alibaba, Citrix, Oracle and SUSE 2016: Xen 4.7 came with Live Patching for x86 2016: Xen 4.8 added extra x86 use-cases and ARM support 2017: XenServer 7.1 releases Live Patching in first commercial product D 10% 1%
  • 14. const char *xen_extra_version(void) { return XEN_EXTRAVERSION; }
 push %rbp mov %rsp,%rbp lea 0x16698b(%rip),%rax leaveq retq const char *xen_extra_version(void) { return “Hello World”; }
 push %rbp mov %rsp,%rbp lea 0x29333b(%rip),%rax leaveq Retq Replacing compiled functions with new code, encoded in an ELF file called payload, while the hypervisor is running without impacting running guests. Design: xenbits.xenproject.org/docs/unstable/misc/livepatch.html
  • 15. The exact source tree used to build the running Xen instance. The .config from the original build of Xen. A build-id onto which the livepatch will be applied. A source patch. livepatch- build- tools The exact same compilation toolchain used to build the running Xen. Livepatch payload
  • 16. Supports stacking of different payloads; payloads depend on build-id Functionality: list: lists loaded and applied live patches upload: load & verify a live patch unload: unload a live patch apply: apply a live patch revert: un-apply a live patch Xen 4.8.1 XSA 213 XSA 214 XSA 215 Depends on build-id of 4.8.1 Depends on build-id of XSA 213 Depends on build-id of XSA 214
  • 17. Target Dom0 & Guest Linux Kernel Hypervisor Technology Kernel Live Patching kPatch (RedHat) Xen LivePatch kSplice (Oracle) kGraft (SUSE) Function + Data ✔ ✔ ✔ Xen 4.7 ✔ ✔ Inline patching ✗ ✗ ✗ Future ✔ ✗ Data Structures ✗ ✔ via hooks ✔ ✔ ✗ Xen 4.8 via hooks XenServer LivePatch Integrates different solutions into a single user experience For Dom0 (CentOS) For Xen
  • 18. Source patches + other build artifacts Hot Fixes contain Per valid patch level: a Xen or Dom0 Live Patch Matching RPMs for most recent patch level In case of a reboot or for Xen/Dom0 not capable of Live Patching Extensive Verification and Validation: The process of patching a live hypervisor or kernel is not an easy task. What happens is a little bit like open heart surgery. The patient is the hypervisor and/or Dom0 itself, and precision and care are needed to get things right. One wrong move and it is game over. Live Patch Live Patch Live Patch build for each patch level package Hot Fix LPsRPMs RPMRPMRPM build for most recent patch level Hot Fix LPsRPMs Publication SigningValidation Verification Q&A (livepatch-build or kpatch-build) (iso)
  • 19. XAPI Toolstack Hot Fix LPsRPM downloadHot Fix LPsRPM Dom0 Dom0 Kernel (CentOS) Hypervisor XenCenter or xe Initiates host update SysAdmin Running System instance that supports live patching Disk updates (such that after reboot the patches are applied) works out correct LP & updates (using native live patching tools or APIs)
  • 20. Pratap Sankar @ Flickr xenbits.xenproject.org/people/larsk/LCC17 - Build LivePatch.mp4 xenbits.xenproject.org/people/larsk/LCC17 - Apply LivePatch.mov
  • 24. Pratap Sankar @ Flickr Xen Project LivePatch Specification & Status xenbits.xenproject.org/docs/unstable/misc/livepatch.html wiki.xenproject.org/wiki/LivePatch Xen Project LivePatch Presentations & Videos xenbits.xenproject.org/people/larsk/FOSDEM17-LivePatch.pdf (Short) people/larsk/XPDS16-LivePatch.pdf (Long) Xen Project LivePatch Videos fosdem.org/2017/schedule/event/iaas_livepatxen/ XenServer xenserver.org
  • 27. Vulnerability data from cvedetails.com 0 50 100 150 200 250 300 350 2017* 2016 2015 2014 2013 2012 n Xen Project n Linux Kernel n QEMU/KVM *) Data up to May 31st, 2017
  • 28. R: Vulnerability reported to security@xenproject.org P: Vulnerability pre-disclosed on xen-security-issues@lists.xenproject.org R P Fixing Security Bugs: Dedicated security team = security experts from within the Xen Project Community Security Team: Triage Creation of fix/patches Can a Livepatch can be created? No? If possible, re-write fix/patches Validation of fix/patches Assignment of CVE Issue description and risk analysis
  • 29. AR P Fix their systems/software: Eligible Xen Project Users are informed under embargo of the vulnerability Eligible Users = Pre-disclosure list members: Product Companies, Open Source & Commercial Distros (e.g. Huawei, Debian) Service/Cloud Providers (e.g. Alibaba) Large Private Downstream (e.g. Google) Allowed to share information via xen-security-issues- discuss@lists.xenproject.org R: Vulnerability reported to security@xenproject.org P: Vulnerability pre-disclosed on xen-security-issues@lists.xenproject.org A: Vulnerability announced on xen-announce@lists.xenproject.org & xenbits.xen.org/xsa
  • 30. A XR P General Publication: Information about vulnerability is made public Everyone else: Patches their systems either through security updates from distros/products or builds them from source. Users of service/cloud providers will not be impacted R: Vulnerability reported to security@xenproject.org P: Vulnerability pre-disclosed on xen-security-issues@lists.xenproject.org A: Vulnerability announced on xen-announce@lists.xenproject.org & xenbits.xen.org/xsa
  • 31. A XR P Responsible Disclosure: fix critical systems/software before publication R: Vulnerability reported to security@... P: Vulnerability pre-disclosed to eligible users A: Vulnerability announced publicly F: Fix available Full Disclosure, immediate (no-fix): public disclosure without a fix A XR F A XR Full Disclosure, post-fix: public disclosure with a fix F F
  • 32. 4) http://oss-security.openwall.org/wiki/mailing-lists/distros 5) http://www.openwall.com/lists/oss-security 6) No Chinese companies or distros on pre-disclosure list 7) Only handles x86 KVM bugs (no ARM or other bugs) 1) Is the CVE severity used to handle vulnerabilities differently? 2) Days embargoed (information is secret) 3) D = Distros/Products, S = Public Service, P = Private Downstream Responsible only Days 2 Who? 3FOSS Project Bug Severity 1 Process Type 14-19 D 6 Linux Kernel via OSS security distros 4 ≥ Medium – Critical Responsible Disclosure 14-19 D 6 QEMU/KVM via OSS security distros 4 OSS security 5 ≥ Medium – Critical ≤ Low Responsible Disclosure 7 Full Disclosure, no-fix 3-5 D, S, POpenStack OSSA OpenStack OSSN ≥ Medium – Critical ≤ Low Responsible Disclosure Full Disclosure, post-fix Xen Hypervisor Includes Linux & QEMU vulnerabilities in supported Xen configurations Low – Critical Responsible Disclosure 14 D, S, P 14-19 D 6 Linux Kernel via OSS security distros 4 OSS security 5 ≥ Medium – Critical ≤ Low Responsible Disclosure Full Disclosure, no-fix
  • 34. Only Hypervisor with VMI Protection from new classes of malware Several security companies working with XenServer Live Patching Disruption free application of vulnerabilities Used by several cloud providers Used best in commercial products, e.g. XenServer Industry Leading Vulnerability Process Includes QEMU and Kernel XSAs Designed with input from Cloud Providers Stable number of CVEs BUT: the Xen Project cannot today distribute XSAs as Live Patches (the project delivers source code only) Sys Admins Extra protection = extra piece of mind Picture by Lars Kurth
  • 35. xenbits.xenproject.org/people/larsk You can also contact Patrick Zhang (patrick.zhang@citrix.com)
 after the presentation Picture by Lars Kurth