similar to: QEMU guest-agent safety in hostile VM?

Displaying 20 results from an estimated 10000 matches similar to: "QEMU guest-agent safety in hostile VM?"

2018 Feb 28
3
Libvirt supported qemu-ga commands
Where can I find the full list of libvirt supported qemu-ga commands? The docs [0] imply virDomainQemuAgentCommand bypasses libvirt and is not recommended. I am looking to pass suspend/resume events from the host to the guest and then have the guest act on this internally. Your help is appreciated. [0] https://wiki.libvirt.org/page/Qemu_guest_agent
2018 Aug 10
4
Efficacy of jitterentropy RNG on qemu-kvm Guests
Hello. I'm a distro maintainer and was wondering about the efficacy of entropy daemons like haveged and jitterentropyd in qemu-kvm. One of the authors of haveged [0] pointed out if the hardware cycles counter is emulated and deterministic, and thus predictible. He therefore does not recommend using HAVEGE on those systems. Is this the case with KVM's counters? PS. I will be setting VM CPU
2018 Mar 01
1
Re: Libvirt supported qemu-ga commands
Daniel P. Berrangé: > On Wed, Feb 28, 2018 at 11:13:46PM +0000, procmem wrote: >> Where can I find the full list of libvirt supported qemu-ga commands? >> The docs [0] imply virDomainQemuAgentCommand bypasses libvirt and is not >> recommended. >> >> I am looking to pass suspend/resume events from the host to the guest >> and then have the guest act on this
2013 Jul 12
4
simplify a dataframe
Hello I have the following problem : group the lines of a dataframe when no information change (Matricule, Nom, Sexe, DateNaissance, Contrat, Pays) and when the value of Debut of lines i = value Fin of lines i-1 I can obtain it with a do loop. Is it possible to avoid the loop ? The dataframe initial is df1 dput(df1) structure(list(Matricule = c(1L, 1L, 1L, 6L, 6L, 6L, 6L, 6L, 6L, 8L, 8L, 8L,
2018 May 19
5
Virtio-net drivers immune to Nethammer?
Hi I'm a privacy distro maintainer investigating the implications of the newly published nethammer attack [0] on KVM guests particularly the virtio-net drivers. The summary of the paper is that rowhammer can be remotely triggered by feeding susceptible* network driver crafted traffic. This attack can do all kinds of nasty things such as modifying SSL certs on the victim system. * Susceptible
2019 Oct 05
2
Emulated TPM doesn't work on Debian Buster
Hi. I am very interested in the security properties a totally open TPM can give our users? - its use as a universal smartcard to protect all types of keys. When adding the virtual 1.2 or 2.0 TPM I get the vague error below. OS is Debian stable with standard packages. Error starting domain: Unable to find 'swtpm' binary in $PATH: No such file or directory Traceback (most recent call
2006 Jun 28
4
argument out of range...
Hi... I''ve a problem with this : [code] def fir_tahiti @notams=Array.new Notam.find_all_notams().each do |notam| @notams.push(notam) if (to_secs(notam.debut)<Time.now.to_i and to_secs(notam.fin)>Time.now.to_i) end end def to_secs(str = nil) Time.gm(2000+str[0..1].to_i, str[2..3].to_i, str[4..5].to_i, str[6..7].to_i, str[8..9].to_i).to_i if str end [/code] It tells
2003 May 27
1
Duplicate numbers with outbounding calls
I've a problem with my X100P card. I'm setting up a VoIP to PSTN gateway,with oh323. This works, but when I call an PSTN phone number, some digits are duplicated, so I'm unable to call the right person. Not very clear ? I'll try to do better (sorry, I'm french...) example : I use ohphone (with quicknet hardware), I call asterisk (*192*168*1*204#), asterisk answers, I choose
2005 Aug 24
2
Developers Wanted
Hi, I recently won the Railsday contest and the response has been overwhelming. I''m currently looking for: 1) Rails programmers with at least A FEW COMPLETE Rails applications under their belt 2) Front-end XHTML/CSS developers who are comfortable working with Rails and all the Ajaxy goodness to help me finish up several of my current projects and stick around for the next
2010 May 13
1
Using Sweave in hostile environments
I'm trying to put together a poster using the LaTeX a0poster package and including some things from pstricks to get gradient shading, etc. The problem is that the default environments used by Sweave don't work where I need them. A simple code chunk like <<eval=FALSE>>= x <- 1 @ buried in a minipage within a psshadowbox gives the error Runaway argument? > x <- 1
2007 Apr 20
10
Softphone that supports central provisioning?
Has anyone found a softphone that supports pulling it's configuration from a central server via TFTP/FTP/HTTP, much like hard desk phones use? I'm looking for something for a call center that I can provision from a central location by generating config files. If the phone has "soft keys" (yes, I know they're all soft - but you know what I mean; programmable buttons whose
2018 Aug 16
1
Re: Efficacy of jitterentropy RNG on qemu-kvm Guests
Martin Kletzander: > On Fri, Aug 10, 2018 at 08:33:00PM +0000, procmem wrote: >> Hello. I'm a distro maintainer and was wondering about the efficacy of >> entropy daemons like haveged and jitterentropyd in qemu-kvm. One of the >> authors of haveged [0] pointed out if the hardware cycles counter is >> emulated and deterministic, and thus predictible. He therefore does
2018 Jun 24
2
Read-only Guests for Anti-Forensics
Hello. I'm interested in running guests as read-only to turn them into a sort of virtualized "live=cd". The goal is to leave no forensic evidence on the host disk or virtual one which would lead to traces on the host still- similar to how TAILS works but with the added convenince and flexibility of running in a VM. If I set the qcow image to read-only as per the manual, will any
2011 Oct 25
1
ssh-agent use in different security domains
Consider this topology domain1-server1 domain2-server2 | | laptop - domain1-server1 ---- domain2-server1 Laptop has two ssh identities, domain1 and domain2. I don't wish to store identity locally in any of the servers. As far as I understand, there isn't any way to limit ssh-agent to allow only signing
2010 Jun 01
5
How to make R automatic?
Hello, I have a question about how R can run automatically. Here is the story: A file called "data.csv" will be generated every couple of minutes in a folder (overwrite itself). What I want R to do is: 1) scan the folder to find the file. 2) if the file is a newly generated file, process the file 3) output some file identifier on the screen, such as the time when the file was
2020 Oct 30
2
Fail to build libvirt upstream rpm on fedora 33
Hello, I encountered errors when building rpm on fedora33: Versions: libvirt: v6.9.0-rc2 gcc-10.2.1-5.fc33.x86_64 meson-0.55.3-1.fc33.noarch ninja-build-1.10.1-2.fc33.x86_64 binutils-2.35-11.fc33.x86_64 Steps: 1. Archive libvirt source code to ~/rpmbuild/SOURCES/libvirt-6.9.0.tar.xz 2. Copy libvirt.spec.in to ~/rpmbuild/SPECS/libvirt.spec. Then `sed -i s/@VERSION@/6.9.0/g
2009 Apr 03
1
Wine hangs vb program after 3/4 seconds
Hello all, I have made the program run using winetricks to install a bunch of packages into my wine drive. So the program is running BUT it hangs (disapears) after 3/4 seconds it is started. I have this debut output (using verbose): Code: [nata at localhost bin]$ ./wine --verbose --cx-app mycommerce.exe CXConfig->read(/home/nata/cxoffice/etc/cxoffice.conf) Product version=7.1.0 Running
2019 Oct 07
0
Re: Emulated TPM doesn't work on Debian Buster
On Mon, 2019-10-07 at 13:26 +0000, procmem@riseup.net wrote: > On 10/7/19 7:31 AM, Andrea Bolognani wrote: > > On Sat, 2019-10-05 at 14:32 +0000, procmem@riseup.net wrote: > > > Hi. I am very interested in the security properties a totally open TPM > > > can give our users - its use as a universal smartcard to protect all > > > types of keys. When adding the
2014 Nov 18
2
Syslinux 6.03, kernel not relocatable.
On 11/17/2014 12:55 AM, Didier Spaier wrote: > > So one more question: why can one boot with a GRUB EFI bootloader > but not with the SYSLINUX bootloader, using the same kernel? > > More accurately, I know why: because of the aforementioned patch, but > then, why is this test needed in SYSLINUX only? > Because Grub boots the kernel in a "hostile" way (not using
2012 Jul 26
3
[LLVMdev] proposal for exploiting undefined behavior much more aggressively
http://blog.regehr.org/archives/761 Thanks, John