skip to main content
article

Privileged operations in the PlanetLab virtualised environment

Published:01 January 2006Publication History
Skip Abstract Section

Abstract

Virtualised systems have experienced a resurgence in popularity in recent years, whether used to support multiple OSes running on a user's desktop, provide commercial application hosting facilities, or isolate a large number of users from each other in global network testbeds. We also see an increasing level of interest in having entities within these virtualised systems interact with each other, either as peers or as helpers providing a service to clients.Very little work has been previously conducted on how such interaction between virtualised environments can take place. We introduce Proper, a service running on the PlanetLab system, that allows unprivileged entities to access privileged operations in a safe, tightly controlled manner.This paper describes our work designing and implementing Proper, including a discussion of the various architectural decisions made. We describe how implementing such a system in a traditional UNIX environment is non-trivial, and provide a number of examples of how services running on PlanetLab actually use Proper.

References

  1. Debian APT tool ported to RedHat Linux. http://www.apt-get.org/.Google ScholarGoogle Scholar
  2. Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., and Warfield, A. Xen and the Art of Virtualization. In Proc. 19th SOSP (Lake George, NY, Oct 2003). Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Bavier, A., Bowman, M., Culler, D., Chun, B., Karlin, S., Muir, S., and And, T. S. Operating System Support for Planetary-Scale Network Services. In Proc. 1st NSDI (San Francisco, CA, Mar. 2004). Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. ENSIM CORP. Ensim Virtual Private Server. http://www.ensim.com/products/privateservers/index.html.Google ScholarGoogle Scholar
  5. Ford, B., Hibler, M., Lepreau, J., McGrath, R., and Tullmann, P. Interface and Execution Models in the Fluke Kernel. In Proc. 3rd OSDI (New Orleans, LA, Feb 1999). Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Fournet, C., and Gordon, A. D. Stack Inspection: Theory and Variants. In Proceedings of the 29th ACM Symposium on Principles of Programming Languages (Portland, OR, Jan 2002). Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Garfinkel, T., Pfaff, B., and Rosenblum, M: Ostia: A Delegating Architecture for Secure System Call Interposition. In Proc. 2004 Symposium on Network and Distributed System Security (2004).Google ScholarGoogle Scholar
  8. Gong, L. Inside Java 2 Platform Security. Addison Wesley, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Jim, T., Morrisett, G., Grossman, D., and Hicks, M. Cyclone: A Safe Dialect of C. In Proc. USENIX '02 (Monterey, CA, Jun 2002). Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Kamp, P.-H., and Watson, R. N. M. Jails: Confining the Omnipotent Root. In Proc. 2nd Int. SANE Conf. (Maastricht, The Netherlands, May 2000).Google ScholarGoogle Scholar
  11. Kotsovinos, E., Moreton, T., Pratt, I., Ross, R., Fraser, K., Hand, S., and Harris, T. Global-scale service deployment in the XenoServer platform. In Proc. of the 1st Workshop on Real, Large Distributed Systems (San Francisco, CA, Dec 2004).Google ScholarGoogle Scholar
  12. Leslie, I. M., McAuley, D., Black, R., Roscoe. T., Barham, P. T., Evers, D., Fairbairns, R., and Hyden, E. The Design and Implementation of an Operating System to Support Distributed Multimedia Applications. IEEE J. Sel. Areas Comm. 14, 7 (1996), 1280--1297. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. LINUX VSERVERS PROJECT. http://linux-vserver.org/.Google ScholarGoogle Scholar
  14. Loscocco, P., and Smalley, S. Integrating Flexible Support for Security Policies into the Linux Operating System. In Proc. of the 2001 USENIX Annual Technical Conference (FREENIX Track) (Boston, MA, Jun 2001). Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Object Management Group (OMG). Common Object Request Broker Architecture (CORBA). http://www.corba.org/.Google ScholarGoogle Scholar
  16. Provos, N. Improving Host Security with System Call Policies. In Proc. 12th USENIX Security Symposium (Washington, DC, Aug 2003), pp. 257--272. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Shapiro, J. S., Smith, J. M., and Farber, D. J. EROS: A Capability System. In Proc. 17th SOSP (Kiawah Island Resort, SC, Dec 1999). Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Spencer, R., Smalley, S., Loscocco, P., Hibler, M., Andersen, D., and Lepreau, L. The Flask Security Architecture: System Support for Diverse Security Policies. In Proc. 8th USENIX Security Symposium (WA, Aug 1999). Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Tucker, A., and Comay. Solaris Zones: Operating System Support for Server Consolidation. In 3rd Virtual Machine Research and Technology Symposium Works-in-Progress (San Jose, CA, May 2004).Google ScholarGoogle Scholar
  20. User-Mode Linux. http://user-mode-linux.sourceforge.net/.Google ScholarGoogle Scholar
  21. Virtual PC. http://www.microsoft.com/windows/virtualpc/default.mspx.Google ScholarGoogle Scholar
  22. VMWare. http://www.vmware.com/.Google ScholarGoogle Scholar
  23. Whitaker, A., Shaw, M., and Gribble, S. D. Scale and Performance in the Denali Isolation Kernel. In Proc. 5th OSDI (Boston, MA, December 2002), pp. 195--209. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Wright, C., Cowan, C., Smalley, S., Morris, J., and Kroah-Hartman, G. Linux Security Modules: General Security Support for the Linux Kernel. In Proceedings of the 11th USENIX Security Symposium (San Francisco, CA, Aug 2002). Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Xie, Y., Kim, H., O'Hallaron, D., Reiter, M., and Zhang. H. Seurat: A Pointillist Approach to Anomaly Detection. In Proceedings of the 7th International Symposium on Recent Advances in Intrusion Detection (RAID 2004) (Sep 2004).Google ScholarGoogle ScholarCross RefCross Ref
  26. Yum: Yellow Dog Updater Modified. http://linux.duke.edu/projects/yum/.Google ScholarGoogle Scholar

Index Terms

  1. Privileged operations in the PlanetLab virtualised environment

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image ACM SIGOPS Operating Systems Review
            ACM SIGOPS Operating Systems Review  Volume 40, Issue 1
            January 2006
            101 pages
            ISSN:0163-5980
            DOI:10.1145/1113361
            Issue’s Table of Contents

            Copyright © 2006 Authors

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 January 2006

            Check for updates

            Qualifiers

            • article

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader