VirtualBox

source: vbox/trunk/doc/manual/en_US/user_Security.xml@ 36007

Last change on this file since 36007 was 36007, checked in by vboxsync, 14 years ago

doc/manual: stronger warnings about insecure authentication / http transfer

  • Property svn:eol-style set to native
  • Property svn:keywords set to Author Date Id Revision
File size: 3.8 KB
Line 
1<?xml version="1.0" encoding="UTF-8"?>
2<!DOCTYPE chapter PUBLIC "-//OASIS//DTD DocBook XML V4.4//EN"
3"http://www.oasis-open.org/docbook/xml/4.4/docbookx.dtd">
4<chapter id="Troubleshooting">
5 <title>Security considerations</title>
6
7 <sect1>
8 <title>Potentially insecure operations</title>
9
10 <para>The following features of VirtualBox can present security
11 problems:<itemizedlist>
12 <listitem>
13 <para>Enabling 3D graphics via the Guest Additions exposes the host
14 to additional security risks; see <xref
15 linkend="guestadd-3d" />.</para>
16 </listitem>
17
18 <listitem>
19 <para>When teleporting a machine, the data stream through which the
20 machine's memory contents are transferred from one host to another
21 is not encrypted. A third party with access to the network through
22 which the data is transferred could therefore intercept that
23 data.</para>
24 </listitem>
25
26 <listitem>
27 <para>When using the VirtualBox web service to control a VirtualBox
28 host remotely, connections to the web service (through which the API
29 calls are transferred via SOAP XML) are not encrypted, but use plain
30 HTTP. This is a potential security risk! For details about the web
31 service, please see <xref linkend="VirtualBoxAPI" />.</para>
32 </listitem>
33 </itemizedlist></para>
34 </sect1>
35
36 <sect1>
37 <title>Authentication</title>
38
39 <para>The following components of VirtualBox can use passwords for
40 authentication:<itemizedlist>
41 <listitem>
42 <para>When using the VirtualBox extension pack provided by Oracle
43 for VRDP remote desktop support, you can optionally use various
44 methods to configure RDP authentication. The "null" method is
45 very insecure and should be avoided in a public network.
46 See <xref linkend="vbox-auth" /> for details.</para>
47 </listitem>
48
49 <listitem>
50 <para>When using teleporting, passwords can optionally be used to
51 protect a machine waiting to be teleported from unauthorized access.
52 Note however that these passwords are stored <emphasis
53 role="bold">unencrypted</emphasis> in the machine configuration XML
54 and therefore potentially readable on the host. See <xref
55 linkend="teleporting" /> and <xref
56 linkend="vboxmanage-modifyvm-teleport" />.</para>
57 </listitem>
58
59 <listitem>
60 <para>When using remote iSCSI storage and the storage server
61 requires authentication, a password can optionally be supplied with
62 the <computeroutput>VBoxManage storageattach</computeroutput>
63 command. Note however that this is stored <emphasis
64 role="bold">unencrypted</emphasis> in the machine configuration and
65 is therefore potentially readable on the host. See <xref
66 linkend="storage-iscsi" /> and <xref
67 linkend="vboxmanage-storageattach" />.</para>
68 </listitem>
69
70 <listitem>
71 <para>When using the VirtualBox web service to control a VirtualBox
72 host remotely, connections to the web service are authenticated in
73 various ways. This is described in detail in the VirtualBox Software
74 Development Kit (SDK) reference; please see <xref
75 linkend="VirtualBoxAPI" />.</para>
76 </listitem>
77 </itemizedlist></para>
78 </sect1>
79
80 <sect1>
81 <title>Encryption</title>
82
83 <para>The following components of VirtualBox use encryption to protect
84 sensitive data:<itemizedlist>
85 <listitem>
86 <para>When using the VirtualBox extension pack provided by Oracle
87 for VRDP remote desktop support, RDP data can optionally be
88 encrypted. See <xref linkend="vrde-crypt" /> for details.</para>
89 </listitem>
90 </itemizedlist></para>
91 </sect1>
92</chapter>
Note: See TracBrowser for help on using the repository browser.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette