VirtualBox

Changeset 38556 in vbox


Ignore:
Timestamp:
Aug 29, 2011 12:03:07 PM (13 years ago)
Author:
vboxsync
Message:

doc/manual: more security stuf

File:
1 edited

Legend:

Unmodified
Added
Removed
  • trunk/doc/manual/en_US/user_Security.xml

    r38507 r38556  
    3535              <para>
    3636                Use proper means, for instance a firewall, to protect your computer
    37                 and your guest(s) from accesses from the outside.
    38               </para>
    39               <para>
    40                 The default networking mode for VMs is NAT which means that
    41                 the VM acts like a computer behind a router, see
    42                 <xref linkend="network_nat"/>. If bridged networking is used,
    43                 the VM acts like a computer inside the same network as the host,
    44                 see <xref linkend="network_bridged"/>. In this case, a firewall
    45                 might be necessary to protect other computers on the subnet from
    46                 a potential malicious guest. In some cases it is worth to consider
    47                 adding a forwarding rule for a specific port in NAT mode instead
    48                 of using bridged networking.
    49               </para>
    50               <para>
    51                 Sometimes a VM doesn't need to be connected to the public network
    52                 at all. Internal networking (see <xref linkend="network_internal"/>)
    53                 or host-only networking (see <xref linkend="network_hostonly"/>)
    54                 are often sufficient to connect VMs among each other or to connect
    55                 VMs only with the host but not with the public network.
     37                and your guest(s) from accesses from the outside. Choosing the proper
     38                networking mode for VMs helps to separate host networking from the
     39                guest and vice versa.
    5640              </para>
    5741            </glossdef>
     
    6347              <para>
    6448                The principle of least privilege states that users should be given the
    65                 least amount of privilege to perform their jobs. We strongly discourage
    66                 from executing VirtualBox with system privileges.
     49                least amount of privilege to perform their jobs. Execute VirtualBox
     50                always as regular user. We strongly discourage from executing
     51                VirtualBox with system privileges.
    6752              </para>
    6853            </glossdef>
     
    10489    <title>Installation Overview</title>
    10590    <para>
     91      The VirtualBox base package should be downloaded only from a trusted source,
     92      for instance the official website
     93      <ulink url="http://www.virtualbox.org">http://www.virtualbox.org</ulink>.
     94      The integrity of the package should be verified with the provided SHA256
     95      checksum which can be found on the official website.
     96    </para>
     97    <para>
    10698      General VirtualBox installation instructions for the supported hosts can
    107       be found in <xref linkend="installation"/>. On certain hosts it is possible
    108       to omit certain VirtualBox components from installing but the general case
    109       is to install the complete VirtualBox package. The installation must be
    110       done with system privileges.
     99      be found in <xref linkend="installation"/>. On some hosts it is possible
     100      to disable certain VirtuallBox components during the installation but the
     101      regular case is to install the complete VirtualBox package. The installation
     102      must be done with system privileges. All VirtualBox binaries should be
     103      executed as regular user and never as privileged user.
     104    </para>
     105    <para>
     106      The Oracle VM VirtualBox extension pack provides additional features
     107      and must be downloaded and installed separately, see
     108      <xref linkend="intro-installing"/>. Like the for base package, the SHA256
     109      checksum of the extension pack should be verified. As the installation
     110      requires system privileges, the VirtualBox GUI will ask for the system
     111      password during the installation of the extension pack.
    111112    </para>
    112113  </sect2>
     
    116117    <para>
    117118      Normally there is no post installation configuration of VirtualBox components
    118       required. However, on Solaris and Linux hosts it is required to configure
     119      required. However, on Solaris and Linux hosts it is necessary to configure
    119120      the proper permissions for users executing VMs which should be able to
    120       access certain host resources. Linux users must be member of the
    121       <emphasis>vboxusers</emphasis> group to pass USB devices to a guest. If a
    122       serial interface should be accessed from a VM, the proper permissions must
    123       be granted to the user as well. The same applies to raw partitions which
    124       should be accessible for a VM.
     121      access certain host resources. For instance, Linux users must be member of
     122      the <emphasis>vboxusers</emphasis> group to be able to pass USB devices to a
     123      guest. If a serial host interface should be accessed from a VM, the proper
     124      permissions must be granted to the user to be able to access that device.
     125      The same applies to other resources like raw partitions, DVD/CD drives
     126      and sound devices.
    125127    </para>
    126128  </sect2>
     
    135137      <para>
    136138        One property of virtual machine monitors (VMMs) like VirtualBox is to encapsulate
    137         a guest by executing it in a dedicated environment, a virtual machine,
     139        a guest by executing it in a protected environment, a virtual machine,
    138140        running as a user process on the host operating system. The guest cannot
    139141        communicate directly with the hardware or other computers but only through
    140142        the VMM. The VMM provides emulated physical resources and devices to the
    141         guest which are used by the guest operating system to perform the required
    142         tasks. The VM settings control the amount of resources provided to the guest
    143         (for example the amount of guest RAM or the number of guest processors, (see
    144         <xref linkend="generalsettings"/>) and the selection of features enabled
    145         for a specific VM process (for example remote control, see
    146         <xref linkend="vrde"/>).
     143        guest which are accessed by the guest operating system to perform the required
     144        tasks. The VM settings control the resources provided to the guest, for example
     145        the amount of guest memory or the number of guest processors, (see
     146        <xref linkend="generalsettings"/>) and the enabled features for that guest
     147        (for example remote control, certain screen settings and others).
    147148      </para>
    148149    </sect2>
    149 
    150     <!--
    151     <sect2>
    152       <title>Configuring and Using Authentication</title>
    153     </sect2>
    154 
    155     <sect2>
    156       <title>Configuring and Using Access Control</title>
    157     </sect2>
    158 
    159     <sect2>
    160       <title>Configuring and Using Security Audit</title>
    161     </sect2>
    162 
    163     <sect2>
    164       <title>Congiguring and Using Other Security Features</title>
    165     </sect2>
    166     -->
    167 
    168   </sect1>
    169 
    170   <!--
    171   <sect1>
    172     <title>Security Considerations for Developers</title>
    173   </sect1>
    174   -->
    175 
    176   <sect1>
    177     <title>Potentially insecure operations</title>
    178 
    179     <para>The following features of VirtualBox can present security
    180     problems:<itemizedlist>
    181         <listitem>
    182           <para>Enabling 3D graphics via the Guest Additions exposes the host
    183           to additional security risks; see <xref
    184           linkend="guestadd-3d" />.</para>
    185         </listitem>
    186 
    187         <listitem>
    188           <para>When teleporting a machine, the data stream through which the
    189           machine's memory contents are transferred from one host to another
    190           is not encrypted. A third party with access to the network through
    191           which the data is transferred could therefore intercept that
    192           data.</para>
    193         </listitem>
    194 
    195         <listitem>
    196           <para>When using the VirtualBox web service to control a VirtualBox
    197           host remotely, connections to the web service (through which the API
    198           calls are transferred via SOAP XML) are not encrypted, but use plain
    199           HTTP. This is a potential security risk! For details about the web
    200           service, please see <xref linkend="VirtualBoxAPI" />.</para>
    201         </listitem>
    202        
    203         <listitem>
    204           <para>All traffic sent over an UDP Tunnel network attachment is not
    205           encrypted. You can either encrypt it on the host network level (with
    206           IPsec), or use encrypted protocols in the guest network (such as
    207           SSH). The security properties are similar to bridged Ethernet.</para>
    208         </listitem>
    209       </itemizedlist></para>
    210   </sect1>
    211 
    212   <sect1>
    213     <title>Authentication</title>
    214 
    215     <para>The following components of VirtualBox can use passwords for
    216     authentication:<itemizedlist>
    217         <listitem>
    218           <para>When using the VirtualBox extension pack provided by Oracle
     150   
     151    <sect2>
     152      <title>Secure Configuration of Virtual Machines</title>
     153      <para>
     154        Several aspects of a virtual machine configuration are subject to security
     155        considerations.</para>
     156
     157      <sect3>
     158        <title>Networking</title>
     159        <para>
     160          The default networking mode for VMs is NAT which means that
     161          the VM acts like a computer behind a router, see
     162          <xref linkend="network_nat"/>. The guest is part of a private
     163          subnet belonging to this VM and the guest IP is not visible
     164          from the outside. This networking mode works without
     165          any additional setup and is sufficient for many purposes.
     166        </para>
     167        <para>
     168          If bridged networking is used, the VM acts like a computer inside
     169          the same networking as the host, see <xref linkend="network_bridged"/>.
     170          In this case, the guest has the same network access as the host and
     171          a firewall might be necessary to protect other computers on the
     172          subnet from a potential malicious guest as well as to protect the
     173          guest from a direct access from other computers. In some cases it is
     174          worth considering using a forwarding rule for a specific port in NAT
     175          mode instead of using bridged networking.
     176        </para>
     177        <para>
     178          Some setups don't require a VM to be connected to the public network
     179          at all. Internal networking (see <xref linkend="network_internal"/>)
     180          or host-only networking (see <xref linkend="network_hostonly"/>)
     181          are often sufficient to connect VMs among each other or to connect
     182          VMs only with the host but not with the public network.
     183        </para>
     184      </sect3>
     185
     186      <sect3>
     187        <title>VRDP remote desktop authentication</title>
     188        <para>When using the VirtualBox extension pack provided by Oracle
    219189          for VRDP remote desktop support, you can optionally use various
    220190          methods to configure RDP authentication. The "null" method is
    221191          very insecure and should be avoided in a public network.
    222192          See <xref linkend="vbox-auth" /> for details.</para>
    223         </listitem>
     193      </sect3>
     194
     195      <sect3>
     196        <title>Clipboard</title>
     197        <para>
     198          The shared clipboard allows to share data between the host and
     199          the guest. Enabling the clipboard in "Bidirectional" mode allows
     200          the guest to read and write the host clipboard. The "Host to guest"
     201          mode and the "Guest to host" mode limit the access to one
     202          direction. If the guest is able to access the host clipboard it
     203          could also access sensitive data from the host which are shared over
     204          the clipboard.
     205        </para>
     206      </sect3>
     207
     208      <sect3>
     209        <title>3D graphics acceleration</title>
     210        <para>Enabling 3D graphics via the Guest Additions exposes the host
     211          to additional security risks; see <xref
     212          linkend="guestadd-3d" />.</para>
     213      </sect3>
     214
     215      <sect3>
     216        <title>CD/DVD passthrough</title>
     217        <para>Enabling CD/DVD passthrough allows the guest to perform advanced
     218          operations on the CD/DVD drive, see <xref linkend="storage-cds"/>.
     219          This could induce a security risk as a guest could overwrite data
     220          on a CD/DVD medium.
     221        </para>
     222      </sect3>
     223
     224      <sect3>
     225        <title>USB passthrough</title>
     226        <para>
     227          Passing USB devices to the guest provides the guest full access
     228          to these devices, see <xref linkend="settings-usb"/>. For instance,
     229          in addition to reading and writing the content of the partitions
     230          of an external USB disk the guest will be also able to read and
     231          write the partition table and hardware data of that disk.
     232        </para>
     233      </sect3>
     234
     235    </sect2>
     236
     237    <sect2>
     238      <title>Configuring and Using Authentication</title>
     239
     240      <para>The following components of VirtualBox can use passwords for
     241        authentication:<itemizedlist>
    224242
    225243        <listitem>
     
    252270        </listitem>
    253271      </itemizedlist></para>
    254   </sect1>
    255 
    256   <sect1>
    257     <title>Encryption</title>
    258 
    259     <para>The following components of VirtualBox use encryption to protect
    260     sensitive data:<itemizedlist>
     272    </sect2>
     273
     274    <!--
     275    <sect2>
     276      <title>Configuring and Using Access Control</title>
     277    </sect2>
     278
     279    <sect2>
     280      <title>Configuring and Using Security Audit</title>
     281    </sect2>
     282
     283    <sect2>
     284      <title>Congiguring and Using Other Security Features</title>
     285    </sect2>
     286    -->
     287
     288    <sect2>
     289    <title>Potentially insecure operations</title>
     290
     291      <para>The following features of VirtualBox can present security
     292        problems:<itemizedlist>
     293        <listitem>
     294          <para>Enabling 3D graphics via the Guest Additions exposes the host
     295          to additional security risks; see <xref
     296          linkend="guestadd-3d" />.</para>
     297        </listitem>
     298
     299        <listitem>
     300          <para>When teleporting a machine, the data stream through which the
     301          machine's memory contents are transferred from one host to another
     302          is not encrypted. A third party with access to the network through
     303          which the data is transferred could therefore intercept that
     304          data.</para>
     305        </listitem>
     306
     307        <listitem>
     308          <para>When using the VirtualBox web service to control a VirtualBox
     309          host remotely, connections to the web service (through which the API
     310          calls are transferred via SOAP XML) are not encrypted, but use plain
     311          HTTP. This is a potential security risk! For details about the web
     312          service, please see <xref linkend="VirtualBoxAPI" />.</para>
     313        </listitem>
     314       
     315        <listitem>
     316          <para>All traffic sent over an UDP Tunnel network attachment is not
     317          encrypted. You can either encrypt it on the host network level (with
     318          IPsec), or use encrypted protocols in the guest network (such as
     319          SSH). The security properties are similar to bridged Ethernet.</para>
     320        </listitem>
     321      </itemizedlist></para>
     322    </sect2>
     323
     324    <sect2>
     325      <title>Encryption</title>
     326
     327      <para>The following components of VirtualBox use encryption to protect
     328        sensitive data:<itemizedlist>
    261329        <listitem>
    262330          <para>When using the VirtualBox extension pack provided by Oracle
     
    268336        </listitem>
    269337      </itemizedlist></para>
     338    </sect2>
    270339  </sect1>
     340
     341  <!--
     342  <sect1>
     343    <title>Security Considerations for Developers</title>
     344  </sect1>
     345  -->
     346
    271347</chapter>
Note: See TracChangeset for help on using the changeset viewer.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette