On 2/26/20 2:24 PM,
brenda...@gmail.com wrote:
>
> On Wednesday, February 26, 2020 at 12:18:48 PM UTC,
ggg...@gmail.com wrote:
>
> Boxes being the Sandboxing software available in Linux. It is my
> hunch, that the VM's are taking advantage of some hardware feature
> that insulates them that might be a security hole for Boxes. I dunno?
>
>
> Background: Boxes is simply a nice front end for KVM and QEMU, which is
> what most Linux virtualization solutions utilize.
>
> Reasons that Qubes project initially chose Xen over KVM+QEMU (probably
> better explained on the Qubes website):
> 1. The hypervisor code baseis substantially smaller in the Xen case.
> Smaller generally means less security issues.
> 2. Xen came with better suited vt-d/IOMMU support at the time.
> 3. When parts of qemu are needed for certain virtualization scenarios,
> Xen supports sandboxing qemu into stub domains.
> 4. QEMU has been historically problematic when it comes to security
> issues, at least relative to Xen or even Xen w/ qemu in a stub domain.
vchan, etc. These form a specially hardened VM management system. The
Yes. Although the security faq linked above and additional security