VMware Cloud Community
flashg
Contributor
Contributor
Jump to solution

Virtualization in the DMZ

Recently, I read an article on why it might be a bad idea to place virtual machines in a DMZ. While the article was vague at best as too an actual threat, it does introduce an interesting topic for discussion. I gathered from the article that a hacker could form an attack that would allow them to take control of a virtual machine and thus take control of the virtualization host. A new term, virtual machine escape, was introduced as well. While I am no vmware expert, I have been working with computers and operating systems long enough to know that this seems to be a stretch. The author went as far as saying he would never recommend introducing a virtual environment into a DMZ to a client. The article does not mention any particular hypervisor product. But because this was in a CIO targeted magazine, I am expecting Chicken Little in my cube any day now wanting to know the virtual machine exposure in our DMZ. Any comments would be welcome.

0 Kudos
1 Solution

Accepted Solutions
wila
Immortal
Immortal
Jump to solution

Hi,

It depends a bit on the product that you are using, a hosted product like VMware Workstation or VMware Server or the bare metal setups like Vmware ESX or VMware ESXi

If you are talking about the latter (ESX), then till this day there are still no known public exploits in which you can escape the virtual machine and take over the host.

Until such an escape hasn't been proven in the wild, I would say it is pretty safe if setup properly. If such an escape becomes possible then proper security measures should still guard you against most problems. If it would be possible you can expect a quick patch to work around it, but I'm not worried about this and run a few servers in the DMZ myself.

The main thing to worry about is misconfiguration. For example, if you make your DMZ machine dual homed so that it not only participates in the DMZ, but also in the normal LAN, then yes.. it might be dangerous, but that has nothing to do with virtualization and is more a matter of designing a proper setup.



--

Wil

| Author of Vimalin. The virtual machine Backup app for VMware Fusion, VMware Workstation and Player |
| More info at vimalin.com | Twitter @wilva

View solution in original post

0 Kudos
17 Replies
wila
Immortal
Immortal
Jump to solution

Hi,

It depends a bit on the product that you are using, a hosted product like VMware Workstation or VMware Server or the bare metal setups like Vmware ESX or VMware ESXi

If you are talking about the latter (ESX), then till this day there are still no known public exploits in which you can escape the virtual machine and take over the host.

Until such an escape hasn't been proven in the wild, I would say it is pretty safe if setup properly. If such an escape becomes possible then proper security measures should still guard you against most problems. If it would be possible you can expect a quick patch to work around it, but I'm not worried about this and run a few servers in the DMZ myself.

The main thing to worry about is misconfiguration. For example, if you make your DMZ machine dual homed so that it not only participates in the DMZ, but also in the normal LAN, then yes.. it might be dangerous, but that has nothing to do with virtualization and is more a matter of designing a proper setup.



--

Wil

| Author of Vimalin. The virtual machine Backup app for VMware Fusion, VMware Workstation and Player |
| More info at vimalin.com | Twitter @wilva
0 Kudos
Texiwill
Leadership
Leadership
Jump to solution

Hello,

I would first read http://www.vmware.com/files/pdf/dmz_virtualization_vmware_infra_wp.pdf from VMware. As Wila stated there are no known escapes from VMs that work with VMware ESX or ESXi. However, there are several for Workstation that rely upon bad configurations to pull off.

There are several aspects to look at:

What would it take to escape the DMZ from the network? Using virtualization does not really change this very much except that with Workstation and Server there is no Layer 2 virtual switch so those products are more susceptible than ESX based VMs.

What would it take to escape the VM from within the VM? it is impossible to keep an application from detecting it is running from within a VM, so I would not even try. Yet, you need to make sure your ESX host is not also acting as a file server. This is the big possibility of attack. However, it a default configuration this is not allowed so its not a huge risk.

Which virtualization product are you concerned about?


Best regards,

Edward L. Haletky

VMware Communities User Moderator

====

Author of the book 'VMWare ESX Server in the Enterprise: Planning and Securing Virtualization Servers', Copyright 2008 Pearson Education.

SearchVMware Blog: http://itknowledgeexchange.techtarget.com/virtualization-pro/

Blue Gears Blogs - http://www.itworld.com/ and http://www.networkworld.com/community/haletky

As well as the Virtualization Wiki at http://www.astroarch.com/wiki/index.php/Virtualization

--
Edward L. Haletky
vExpert XIV: 2009-2023,
VMTN Community Moderator
vSphere Upgrade Saga: https://www.astroarch.com/blogs
GitHub Repo: https://github.com/Texiwill
0 Kudos
admin
Immortal
Immortal
Jump to solution

Recently I read that we had a solution for world peace and Elvis lives in new jersey.

This (and a few others) rumours, and other nonsense (FUD) have been making the rounds for the last four years. If it is possible I would like to see it, as the government and I have been trying to hack the ESX logic for a long time.

Brian CS

Security Lead

Professional Services

VMware

0 Kudos
Texiwill
Leadership
Leadership
Jump to solution

Hello,

At BlackHat several years ago, someone was able to perform a Directory Traversal attack against VMware Workstation with HGFS enabled. THat is the only known escape from any VMware product and it was soon fixed. Every 3-4 months this comes back as a 'new' issue when its not an issue at all.

Yes it is on going research, will it happen? Maybe... But it is not an issue today with out of the box ESX or ESXi.


Best regards,

Edward L. Haletky

VMware Communities User Moderator

====

Author of the book 'VMWare ESX Server in the Enterprise: Planning and Securing Virtualization Servers', Copyright 2008 Pearson Education.

SearchVMware Blog: http://itknowledgeexchange.techtarget.com/virtualization-pro/

Blue Gears Blogs - http://www.itworld.com/ and http://www.networkworld.com/community/haletky

As well as the Virtualization Wiki at http://www.astroarch.com/wiki/index.php/Virtualization

--
Edward L. Haletky
vExpert XIV: 2009-2023,
VMTN Community Moderator
vSphere Upgrade Saga: https://www.astroarch.com/blogs
GitHub Repo: https://github.com/Texiwill
0 Kudos
gary1012
Expert
Expert
Jump to solution

AH, I see that the sky is falling...

Virtual machine escape no vacation

Community Supported, Community Rewarded - Please consider marking questions answered and awarding points to the correct post. It helps us all.
0 Kudos
flashg
Contributor
Contributor
Jump to solution

Brian,

You just made my day with this reply. Of course I am all for world

peace, but never cared much for Elivis' music.

Thanks.

Flash

0 Kudos
flashg
Contributor
Contributor
Jump to solution

Edward,

I figured something like your explanation was the case. We are not

using any of the workstation or free server versions. We are a pure ESX

house. Thanks for the post. Now I have something to tell Chicken

Little.

Thanks again

Flash

0 Kudos
admin
Immortal
Immortal
Jump to solution

lot

0 Kudos
admin
Immortal
Immortal
Jump to solution

LoL

0 Kudos
Texiwill
Leadership
Leadership
Jump to solution

Hello,

I did read the article mentioned and while escaping the VM is theoretically possible, it is such a small risk that I would not be afraid to do so. As always your security is only as good as your vigilance.

So how would one escape a VM today? Via the Network, well that has always been the case, hence the need for good network security and segregation of critical networks (SC, VMotion, Storage) from the Virtual Machines.

Via the VMM? I have yet to see anything that will do this. The VMHGFS was actually a network based directory traversal style attack, so without ESX acting as a file server even that would not be the case and still would fall into the network category. Xen had a boot time escape possibility. But VMware never did have that. Could the backdoor be attacked? That is the first thing everyone thinks about, but it would at most crash the VM and not lead to an escape. The backdoor is tested six ways to sunday and everything new is tried. Could it be a bad driver? VMware has had those and at most the VM crashes. Again no escape.

So far no escapes.... I currently know people looking into timing based attacks, as well as others to somehow find out what the VMM is doing. This type of information leakage may lead to other things. Other than this I have not heard of anything that is being attempted or even that works.


Best regards,

Edward L. Haletky

VMware Communities User Moderator

====

Author of the book 'VMWare ESX Server in the Enterprise: Planning and Securing Virtualization Servers', Copyright 2008 Pearson Education.

SearchVMware Blog: http://itknowledgeexchange.techtarget.com/virtualization-pro/

Blue Gears Blogs - http://www.itworld.com/ and http://www.networkworld.com/community/haletky

As well as the Virtualization Wiki at http://www.astroarch.com/wiki/index.php/Virtualization

--
Edward L. Haletky
vExpert XIV: 2009-2023,
VMTN Community Moderator
vSphere Upgrade Saga: https://www.astroarch.com/blogs
GitHub Repo: https://github.com/Texiwill
azn2kew
Champion
Champion
Jump to solution

Flashg,

If it gives you any confidence to virtualize your systems in DMZ, should of course read that guide from VMware as posted by Edward. I've been working for several financial corporations and security is the key and they have no problems virtualizing their critical internet facing in DMZ and it require extensive knowledge with virtualization and security in general. It requires collaboration of security, networking and virtualization engineer to sit and draw out a plan which best accomodate the project. Throughout our projects, the hardest part is to decide which model we want the dmz machines to be resides and how P2V process takes place.

With too much restrictions and regulations, doing P2V in DMZ is pretty tough especially port 445 & 139 would not be allow so using a laptop with external USB drive and do P2V conversion from there and import the VMs to ESX hosts seems to be the safest. Depends how you architect your solution things can be different.

You can neither join DMZ networks with existing production networks and that's not a pure 100% DMZ solution but it works and supported. If you have enough budget, deploy full virtualization in DMZ should be a way to go but remember to follow best practices to lockdown and put all SC/VMotion/Virtual Center in a management network and use standard CIS, DoD and Tripwire guides to secure your ESX hosts as well.

I have attached my basic diagram of previous client which can't be expose but you're welcome to feedback and it could be much better. It just a general idea how traffic flows but can't guarantee it work for your environment.

If you found this information useful, please consider awarding points for "Correct" or "Helpful". Thanks!!!

Regards,

Stefan Nguyen

iGeek Systems Inc.

VMware, Citrix, Microsoft Consultant

If you found this information useful, please consider awarding points for "Correct" or "Helpful". Thanks!!! Regards, Stefan Nguyen VMware vExpert 2009 iGeek Systems Inc. VMware vExpert, VCP 3 & 4, VSP, VTSP, CCA, CCEA, CCNA, MCSA, EMCSE, EMCISA
flashg
Contributor
Contributor
Jump to solution

Thanks to everyone who replied. The information provided has not only been helpful and informative, but has given me enough to put my management at rest as to any questions about putting vmware in a DMZ. Thanks again.

0 Kudos
macneej
Enthusiast
Enthusiast
Jump to solution

Does anyone have any opinions regarding putting the SC and VMotion ports in the DMZ. I would like to put the SC in the inside network and some VM networks in the DMZ, but our securities team doesn't like the idea. What are your thoughts on this? What security precausions do you put on the SC when it is in the DMZ?

0 Kudos
admin
Immortal
Immortal
Jump to solution

The best thing is to have the SC and Vmotion ports on their own dedicated network. It is not a good idea them sitting out in the public facing DMZ. If you cannot put them in the internal management LAN then I suggest you put them in a protected zone within your DMZ.

See the following paper for more details on the real risks behind virtualizing the DMZ and what your options are.

http://www.vmware.com/files/pdf/dmz_virtualization_vmware_infra_wp.pdf

0 Kudos
Texiwill
Leadership
Leadership
Jump to solution

Hello,

Does anyone have any opinions regarding putting the SC and VMotion ports in the DMZ. I would like to put the SC in the inside network and some VM networks in the DMZ, but our securities team doesn't like the idea. What are your thoughts on this? What security precausions do you put on the SC when it is in the DMZ?

Consider the SC the doors to the kingdom. You do not want to place it in a location that is constantly under attack. the DMZ is such a location. VMotion is even more dangerous as it passes the currently used memory of the VM across the wire in clear text. This contains credential information and other critical information.

If you place the SC and VMotion networks within your DMZ, please expect your systems to be under constant threat and hacked. This is a very very bad idea. As rrandell has stated, the SC and VMotion networks must be protected even if they are on a private segment. Your security folks are most likely concerned that the ESX host will become a bridge between security zones. Which tells me that they may not understand how the Layer 2 vSwitch really works.

I would start them with the http://www.vmware.com/files/pdf/dmz_virtualization_vmware_infra_wp.pdf document and move on from there. I would also NOT implement VMware ESX within a DMZ until they fully understand the consequences as their suggestion is incredibly insecure.


Best regards,

Edward L. Haletky

VMware Communities User Moderator

====

Author of the book 'VMWare ESX Server in the Enterprise: Planning and Securing Virtualization Servers', Copyright 2008 Pearson Education.

SearchVMware Blog: http://itknowledgeexchange.techtarget.com/virtualization-pro/

Blue Gears Blogs - http://www.itworld.com/ and http://www.networkworld.com/community/haletky

As well as the Virtualization Wiki at http://www.astroarch.com/wiki/index.php/Virtualization

--
Edward L. Haletky
vExpert XIV: 2009-2023,
VMTN Community Moderator
vSphere Upgrade Saga: https://www.astroarch.com/blogs
GitHub Repo: https://github.com/Texiwill
0 Kudos
azn2kew
Champion
Champion
Jump to solution

PLEASE DO NOT PUT YOUR SC TO DMZ NETWORK....secure it internally with dedicated management network. If you found this information useful, please consider awarding points for "Correct" or "Helpful". Thanks!!! Regards, Stefan Nguyen iGeek Systems Inc. VMware, Citrix, Microsoft Consultant

If you found this information useful, please consider awarding points for "Correct" or "Helpful". Thanks!!! Regards, Stefan Nguyen VMware vExpert 2009 iGeek Systems Inc. VMware vExpert, VCP 3 & 4, VSP, VTSP, CCA, CCEA, CCNA, MCSA, EMCSE, EMCISA
0 Kudos
macneej
Enthusiast
Enthusiast
Jump to solution

Thanks for your feedback. I'll pass it on.

0 Kudos