@ralphruthe eine hängende vm in einem #xen in einem #proxmox
@ralphruthe eine hängende vm in einem #xen in einem #proxmox
I wish this was easier :( I've got #Linux and #Windows dual-booting, that was the easy part. I want to get Windows running in a #xen hypervisor, even though I've added the SSD drive to the VM (that took a lot of searching!), the machine still can't boot. If anybody could help, *please* do so, I've been fighting with adopting Linux for months now and I just want to get on with making things rather than getting stuff to work :|
Xenophobia (n) — the irrational fear of Type 1 hypervisors
Freexian is excited to announce that we are partnering with Invisible Things Lab to extend security support for Xen hypervisor version 4.17. https://www.freexian.com/blog/xen-4.17-lts/
One of the hashtags _guru
No April Fools' joke - the new #ProxLB release is scheduled for the 1st of April! Stay tuned!
ProxLB is an advanced #loadbalancer for #Proxmox clusters that brings in features like #DRS (known from #VMware), #maintenance mode and (anti-)#affinity groups.
While I'm busy configuring the VM I thought it would be good to get a nice taste of Italia
With the compliments of Sesto Giovanni I got some Birra Moretti from a friend of mine in Europe
From the photographs and the hashtags it must be obvious what I'm doing. Creating a virtual machine with which I will go into simulation mode to ride beautiful machines of absolute maximum Torque and Power
After taking the nickle tour of #Qubes, my hasty conclusion is that it is anti-#KISS; there are seemingly many moving parts under the surface, and many scripts to grok to comprehend what is going on.
I plan to give it some more time, if only to unwrap how it launches programs in a VM and shares them with dom0's X server and audio and all that; perhaps it's easier than I think.
I also think #Xen is a bit overkill, as the claim is that it has a smaller kernel and therefore smaller attack surface than the seemingly superior alternative, #KVM. Doing some rudimentary searching out of identified / known VM escapes, there seem to be many more that impact Xen than KVM, in the first place.
Sure, the #Linux kernel may be considerably larger than the Xen kernel, but it does not need to be (a lot can be trimmed from the Linux kernel if you want a more secure hypervisor), and the Linux kernel is arguably more heavily audited than the Xen kernel.
My primary concern is compartmentalization of 'the web', which is the single greatest threat to my system's security, and while #firejail is a great soltion, I have run into issues maintaining my qutebrowser.local and firefox.local files tuned to work well, and it's not the simplest of solutions.
Qubes offers great solutions to the compartmentalization of data and so on, and for that, I really like it, but I think it's over-kill, even for people that desire and benefit from its potential security model, given what the threats are against modern workstations, regardless of threat actor -- most people (I HOPE) don't have numerous vulnerable services listening on random ports waiting to be compromised by a remote threat.
So I am working to refine my own security model, with the lessons I'm learning from Qubes.
Up to this point, my way of using a system is a bit different than most. I have 2 non-root users, neither has sudo access, so I do the criminal thing and use root directly in a virtual terminal.
One user is my admin user that has ssh keys to various other systems, and on those systems, that user has sudo access. My normal user has access to some hosts, but not all, and has no elevated privileges at all.
Both users occasionally need to use the web. When I first learned about javascript, years and years ago, it was a very benevolent tool. It could alter the web page a bit, and make popups and other "useful" things.
At some point, #javascript became a beast, a monster, something that was capable of scooping up your password database, your ssh keys, and probe your local networks with port scans.
In the name of convenience.
As a result, we have to take browser security more seriously, if we want to avoid compromise.
The path I'm exploring at the moment is to run a VM or two as a normal user, using KVM, and then using SSH X forwarding to run firefox from the VM which I can more easily firewall, and ensures if someone escapes my browser or abuses JS in a new and unique way, that no credentials are accessible, unless they are also capable of breaking out of the VM.
What else might I want to consider? I 'like' the concept of dom0 having zero network access, but I don't really see the threat actor that is stopping. Sure, if someone breaks from my VM, they can then call out to the internet, get a reverse shell, download some payloads or build tools, etc.
But if someone breaks out of a Qubes VM, they can basically do the same thing, right? Because they theoretically 'own' the hypervisor, and can restore network access to dom0 trivially, or otherwise get data onto it. Or am I mistaken?
Also, what would the #LXC / #LXD approach look like for something like this? What's its security record like, and would it provide an equivalent challenge to someone breaking out of a web browser (or other program I might use but am not thinking of at the moment)?
If any #homelab folks have some spare disk space and bandwidth and want to help #resist, you can #selfhost an instance of ArchiveTeam Warrior as a VM.
The VM appliances are downloadable off of GitHub and then you just launch the VM and let it work.
If you use #xcp as your #xen hypervisor, and #xenorchestra to manage it, you might think you can just give it the GitHub URL and import. Sadly, no. I got an error. But the VM is only 165M, so if you download it to your laptop and then upload it via the XO web interface, it's trivial to launch.
TIL that #xen is not dead and they have super kind people at the #vates booth at #fosdem http://vates.tech
VMware: Broadcom loses another major customer due to high costs
The decisive factor for the British cloud provider Beeks to switch from VMware to the open source solution OpenNebula was the high price increases.
VMware: Broadcom verliert weiteren Großkunden wegen hoher Kosten
Ausschlaggebend für den Wechsel des britischen Cloud-Anbieters Beeks von VMware zu der Open-Source-Lösung OpenNebula waren die hohen Preissteigerungen.
Because this is on #Xen and NetBSD 9, the following {munged) patches are used. Not needed in NetBSD 10 because of MAXPHYS changes
+++ external/cddl/osnet/dist/uts/common/fs/zfs/zfs_ioctl.c
@@ -7172,6 +7172,7 @@
printf("WARNING: ZFS on NetBSD is under development\n");
+ printf("ZFS module compiled with MAXPHYS %d\n", MAXPHYS);
+++ sys/modules/zfs/Makefile.zfsmod
@@ -135,5 +135,6 @@
+CPPFLAGS+= -DMAXPHYS=32768
New learning unit in our #NetworkAutomation #eAcademy focused on #Xen, a highly efficient and scalable #hypervisor https://connect.geant.org/2024/10/04/new-learning-unit-in-the-network-eacademy-hypervisor-based-virtualisation-xen
Whether you’re just starting with virtualisation or looking to expand your expertise, this course will provide you with the skills to deploy and manage virtualised environments using Xen.
Trainer: Bojana Koteska, UKIM
Duration: 90min
In case you're wondering just how old this is ... the VM is running in #UML - #UserModeLinux, not the more modern #Xen, or the more modern #KVM, or the more modern #CloudWitchcraft It has been running, with a few upgrades, for over 20 years. It has had over 20 years in which to accrete undocumented customisations and works *perfectly*, which is why I've been procrastinating about this migration for years.