aliguori | 7 years ago | on: AWS Firecracker Open Source: Secure and Fast MicroVM for Serverless Computing
aliguori's comments
aliguori | 7 years ago | on: Firecracker – Lightweight Virtualization for Serverless Computing
I love QEMU, it's an amazing project, but it does a ton and it's very oriented towards running disk images and full operating systems. We wanted to explore something really focused on serverless. So far, I'm really happy with the results and I hope others find it interesting too.
aliguori | 7 years ago | on: EC2 Instance Update – C5 Instances with Local NVMe Storage
aliguori | 7 years ago | on: EC2 Instance Update – C5 Instances with Local NVMe Storage
There's a lot to love about NVMe and timeouts are not actually part of the NVMe specification itself but rather a Linux driver construct. Unfortunately, early versions of the driver used an unsigned char for the timeout value and also have a pretty short timeout for network-based storage.
As mentioned elsewhere in the thread, recent AMIs are configured to avoid this problem out of the box.
aliguori | 8 years ago | on: Vixen: A PV-in-HVM shim
As with all virtual and physical machines, patches are necessary to protect against process-to-process Meltdown within the OS itself. Those are starting to roll out from the respective vendors although it will take time for those to work inside a PV instance.
aliguori | 8 years ago | on: Vixen: A PV-in-HVM shim
aliguori | 8 years ago | on: AWS EC2 Virtualization 2017: Including Nitro
Both i3.metal and c5 use the same underlying Nitro technology.
aliguori | 8 years ago | on: AWS EC2 Virtualization 2017: Including Nitro
aliguori | 8 years ago | on: EC2 Bare Metal Instances with Direct Access to Hardware
aliguori | 8 years ago | on: EC2 Bare Metal Instances with Direct Access to Hardware
aliguori | 8 years ago | on: EC2 Bare Metal Instances with Direct Access to Hardware
aliguori | 8 years ago | on: EC2 Bare Metal Instances with Direct Access to Hardware
Disclaimer: I work at AWS on the team responsible for the Nitro System including EC2 Bare Metal Instances.
aliguori | 8 years ago | on: FreeBSD/EC2 on C5 instances
We will have some more details on how this all works at re:Invent in a couple weeks.
aliguori | 12 years ago | on: Paths to being a kernel hacker
That word doesn't mean what you think it means :-)
aliguori | 12 years ago | on: OpenSSL site defacement involving hypervisor hack rattles nerves
If you break into QEMU, you should be a non-privileged user. If you are using libvirt, you are in a cgroup based jail (basically a container) with SELinux being enforced too. So after breaking into QEMU, you would still need to break out of the container before you could attack anything.
But Nelson's exploit was pretty cool. I initially thought remote code execution wasn't possible and he turned around pretty quickly with the exploit. It's quite impressive.
aliguori | 12 years ago | on: He got 1%, we can't hire him
aliguori | 12 years ago | on: Ask HN: Where to go for max profit? High coder salary, low cost of living
aliguori | 12 years ago | on: Linux Hackers Rebuild Internet From Silicon Valley Garage
However, I have found that a lot of the benefits of virtualization are often lost because of the flexibility of having a full blown Linux OS. People stick too many services on the host and/or don't know how to properly allocate resources.
I think there is something to a simplified model where you no longer have access to any host environment and can only "fill slots". In practical terms, it makes it easier to implement features, like firmware-style upgrade and rollback of the host, for the masses.
Yes, you can do this with a full blown Linux OS on the host but it requires an operational discipline that most environments don't seem to possess.
I'm not sure I buy the whole "run multiple containers on top of an EC2 instance" thing though. I understand why they're using LXC vs traditional virtualization but it seems to me like it's a case of solving all problems by adding another layer of abstraction.
There are too many different kinds of virtualization so we'll just add another layer of virtualization.
aliguori | 12 years ago | on: QEMU 1.6.0 is now available
aliguori | 12 years ago | on: Google confirms Java and OpenSSL crypto PRNG on Android are broken
The problem is that the PRNG has a weak default entropy source. The same problem existed in the kernel for ages. See http://www.factorable.net
The real advice here ought to be that if you are building an application that generates keys, you should make sure that the system has appropriate entropy before generating the keys. Don't assume the PRNG (whether it's /dev/urandom or OpenSSL) does it for you.
Restricting /dev/kvm these days doesn't make much sense. The interface is designed to be safe for any user. The fact that we started as a character device and not syscalls is just a historical decision.