Figure 10 - Physical Sniffer Deployment
Within this deployment, the sniffer is a physical appliance outside the hypervisor.
Advantages:
Physical Sniffers are independent from the hypervisor, and not susceptible to compromise via the hypervisor.
High load on the sniffer does not impact virtual machines or the host.
Disadvantages:
Not all vSwitches support mirror ports.
Dedicated sniffer hardware and sometimes scarce spare physical NIC port required.
Figure 11 - Trunk out all traffic
The deployment shown above trunks out all VM traffic for inspection outside the hypervisor. This works only if direct communication (red dash-lines) is disabled.
Advantages:
Sniffer is independent from hypervisor
High load on the sniffer does not impact virtual machines or the host.
Works with all virtual switches.
Disadvantages:
Most hardware intensive.
Dedicated sniffer hardware and sometimes scarce spare physical NIC port required.
Direct VM-2-VM or vswitch-2-vswitch communication will not be seen (and could easily be enabled by accident or intention).
To tap into “all” communication channels within a virtualized environment, pay attention to specific interfaces that might allow direct communication between entities like VMs, bypassing all network interfaces (virtual and physical). An example of a channel that may remain internal to the physical host and not be obviously visible to monitoring tools would be the “Virtual Machine Communication Interface” VMCI for the VMware hypervisor. As these interfaces typically increase the attack surface, consider disabling them if not required.
Carefully consider what should be captured, recorded and stored in a virtual environment. Sniffing on a vMotion network might disclose (and store somewhere temporarily for investigation) sensitive information like clear text passwords or keys or credit card numbers, etc., as they are included within the VM’s RAM being transferred in clear text.
References and Useful Links
Useful Links
http://www.net-security.org/article.php?id=1509
© Copyright 2012, Cloud Security Alliance. All rights reserved.
|
|
Share with your friends: |