Hey Ulas,
The primary goal behind the jail integration for bhyve was to be able
to hack on the bhyve userland components while still having a
production-capable bhyve.
Adding jails into the mix does not necessarily increase the security
posture of bhyve. If the kernel component(s) of bhyve are compromised,
one should assume full breach of the host environment. If the userland
component(s) of bhyve are compromised, the ability for an attacker to
accomplish their goals is made very difficult by virtue of bhyve's
existing integration with Capsicum.
I suppose an attacker that has compromised the bhyve userland
component(s) could cause undesired behavior in the guest's execution
environment. But that's true regardless of whether jails are involved.
Where jailing might come in handy is being able to use rctl to place
rate limits on the bhyve guest. That's something worth researching.
Thanks,
--
Shawn Webb
Cofounder / Security Engineer
HardenedBSD
Tor-ified Signal:
+1 303-901-1600 / shawn_webb_opsec.50
https://git.hardenedbsd.org/hardenedbsd/pubkeys/-/raw/master/Shawn_Webb/03A4CBEBB82EA5A67D9F3853FF2E67A277F8E1FA.pub.asc