publication croisée depuis : https://lemmy.world/post/16156662
To be completely open, this is not a question about XCP-ng vs Proxmox. I’m open to doing everything in the cli, comparing two platforms is not my intention here.
I’m very interested in the security benefits one has over the other though. AFAIK Xen has a dedicated for security? I’d like to think that both are reasonably secure by default, but I do not get many hits for “KVM hardening”, for example, only OS-level hardening advice.
Do both protect equally against attacks that try to escape the VM? Is there anything in terms of security that one has and the other doesn’t?
I know this is not the usual kind of question that is asked on this sub, any help is greatly appreciated!
From the FAQ of Qubes OS (i.e. most secure desktop OS for general use):
“Why does Qubes use Xen instead of KVM or some other hypervisor?”
“In short: we believe the Xen architecture allows for the creation of more secure systems (i.e. with a much smaller TCB, which translates to a smaller attack surface). We discuss this in much greater depth in our Architecture Specification document.”
Searching for “XenTCB” already brings a lot of useful results
- TCB
- breaking up Hypervisors into smaller parts
- Xen 4.11 release info
- TCB overview
- [scientific paper about some more stuff])https://link.springer.com/content/pdf/10.1007/978-3-319-11203-9_18.pdf)
- security in a commodity hypervisor
Thanks!
As KVM is part if the Linux kernel, I assume you’ll have to look into kernel hardening instead, next to OS hardening. Hardware is also important to consider when talking about VM escaping. A CPU that supports better VM isolation features and encrypted memory
Thanks, that’s a great idea and I’ll keep CPU support in mind
deleted by creator
I’m just being a bit paranoid with my attempts, and yes just KVM on Debian would work perfectly fine for my purposes but I’d like to take the more secure alternative if possible. Another comment about kernel hardening was a good one for KVM, and unfortunately AMD SEV is not available on most of their consumer chips (especially the older generations).
If I were to switch off multi-threading but assign vCPUs to my VM assuming multi-threaded capacity (I.e. assign 12 vCPUs to my lab cluster after switching of SMT for my 6 core CPU), would I face performance issues? I wonder
deleted by creator
Is there an estimate of the loss in performance that I’m looking at, at full load?
Based on this Zen3 benchmark, I’d say somewhere between 40 and 77% for the most impacted workloads tested.
Some tests also run faster without SMT (mostly graphics/AI-on-CPU ones I think) so it really depends on your workload.
On a gaming computer, results seem to vary between -10% to +10% FPS for a Ryzen 9 chip, probably because very few games make good use of that many CPU threads.
If you’re running a small home server or desktop, I’d expect you to throw out a bit less than half the CPU capacity. You do get some of that back in power savings, so if your server is overspecced for your workload, disabling SMT may be interesting regardless of the security aspects.