Debunking Blue Pill myth

Posted by virtualization.info Staff   |   Friday, August 11th, 2006   |  

Since months the security and virtualization industry are discussing about a new security threat: the Blue Pill.

Blue Pill is the prototype resulting from a security study made by Joanna Rutkowska, which took advantage of new virtualization capabilities of AMD processors (known as SVM and previously as Pacifica) to inject a rootkit in a running Vista operating system (check the related Black Hat 2006 presentation).

The world press given this work much attention, often reporting misleading informations, because the scenario involved the upcoming Microsoft operating system, and because Ms. Rutkowska claimed a malware using this method is undetectable.

Assuming every reader out there already discovered, by reading follow-up to original post or other security professional analysis, that this method is not exploiting any flaw in the operating system, claim of undetectability stands still.

virtualization.info met Anthony Liguori, Software Engineer at IBM Linux Technology Center and, most of all, one of the men behind the Xen hypervisor, to finally debunk the Blue Pill myth.

virtualization.info: Anthony thank you for accepting to spend some time with virtualization.info and its readers.
First of all would you explain us your exact involvement in Xen project and since how much time you are working on this role?

Anthony Liguori: I’ve been working on the Xen project for approximately 2 years. Like most Xen hackers, I do a little bit of everything. I’m on an extended vacation right now but normally I’m fortunate enough to be a full time Xen hacker.

My primary interest in Xen is desktop virtualization. Recently, I’ve been involved in a number of desktop-related features including graphics virtualization and HVM VNC support. There are a number of interesting features that are in progress that I’m working on too such as HTTP block device support and a high performance graphics component.

In the past, I’ve been involved in Xen’s web services interface and the libvirt API.

I’ll also take this opportunity too to point out that my comments here are my own opinions and do not represent the opinions of IBM or the Xen project :-)

VI: Let’s talk about the Blue Pill announcement: can you explain us in simple terms the scenario considered by the researcher?

AL: Rutkowska claims to have create a 100% undetectable piece of malware.

The basic idea behind her claim is that one could create a piece of malware that also was a Virtual Machine Monitor. If the VMM could take over the host Operating System (imagine if you could launch Xen on a running copy of Windows and instantly have the previous Windows system be a virtual machine), then it could potentially hide a virus from that virtual machine by remaining within the VMM.

Having a VMM take over a host operating system would be very difficult. It’s not outside of the realm of possibility but it would take a huge engineering effort.

However, for this malware to be successful, it would not only need to be able to take over the host Operating System, but it would also need to prevent that operating system from being able to detect that it was now a virtual machine.

While the former is at least possible (albeit tremendously difficult), the later is not possible which means that anti-malware software will always be able to detect this sort of attack.

VI: Where are risks in this scenario?

AL: If a virus cannot be removed or detected, it’s pretty much a worse case scenario for corporate security. Once there was an outbreak, you couldn’t trust any of your systems at all. I’m not sure how one could even mitigate such a threat–perhaps do frequent reinstalls of every system on your network?

It’s really a doomsday scenario which is why it’s gotten so much press.

Malware at the VMM level could potentially install keyloggers, provide remote access to disk, sniff passwords from a VM’s memory, pretty much anything evil thing that can be imagined.

VI: In your blog, Tales of a Code Monkey, you said Blue Pill claims are unfounded and malware is always detectable. Why?

AL: It’s been a fair bit of time since the post you are referring to. Since then, more details have come out about Rutkowska’s prototype. I should mention that this prototype is very detectable.

All it does is turn on SVM, and set up a small piece of memory that is called periodically. It makes no attempt, currently, to hide that memory from the operating system so one could simply search all of physical memory.

However, even if she builds a full VMM with proper memory protection (which is no small task), there would still be a way to detect it.

Hardware virtualization requires a technique know as “trap and emulation”. The idea is that the hardware traps certain instructions and the VMM emulates those instructions in such a way as to make the software believe it is running in a virtual machine.

Software emulation implies that these instructions take much longer to complete when executed under a VMM then on normal hardware. This fact is what can be used to detect the presence of a VMM.

I approached Rutkowska about this and she attempted to address it in her prototype by adjusting one of the processors clocks on every exit. However, there is nothing that she can due about external time sources and she’s admitted to this on her blog.

She refers to this as a theoritical weakness in her system but I assure you that it is quite practical to exploit.

Keep in mind too that this level of sophistication is not even necessary with the current Blue Pill prototype. She would have to get Blue Pill to the point where it was as good of a VMM as Xen or VMware ESX. That’s no small task!

This general approach can be used to detect any VMM–Xen, VMware, Virtual PC, z/OS, etc. In fact, this is a prediction from one of the earliest papers on virtualization (the Popek/Goldberg paper).

VI: Ms. Rutkowska stated several times that Blue Pill doesn’t exploit any bug at operating system level or hardware level. While this is true, do you think there is something vendors could do to prevent these kind of risks?

AL: I know that Thinkpads come with a BIOS setting to enable or disable virtualization technology. In fact, it is disabled by default.

I assume most vendors provide a BIOS setting to enable or disable VT/SVM. If a problem were found, vendors could simply disable the extension until AMD or Intel fixed the problem.

With that said, I strongly doubt this will ever be necessary.

VI: Ms. Rutkowska developed her prototype to work on machines where AMD SVM is available. Could this approach also work with Intel Virtualization Technology? If not why?

AL: Well, if this approach were valid (which it’s not), it would be equally applicable to VT. The two technologies, in their current forms, are almost completely identical except for some minor differences in performance characteristics.

VI: Looking at Ms. Rutkowaska demostration Austin Wilson, Director of the Windows Client Group at Microsoft, said the company will try to prevent such scenario in upcoming Vista operating system. What do you think can really be done at operating system level to mitigate the risk? Is this something also the Linux, BSD and Solaris communities should look at?

AL: I wouldn’t lose a bit of sleep over this particular threat. I don’t feel there is any new risk here at all.

There is some interesting security research on the horizon though and much of it has a huge intersection with virtualization.

A particularly interesting topic is attestation. Briefly, attestation is the ability to validate that the only software running at a moment in time is the software that is supposed to be there.

Currently, anti-malware software has to look specifically for known threats. Attestation lets you do something much stronger. Attestation allows you to validate that there is no unknown threats.

Imagine anti-virus software that doesn’t need to be updated–ever. With attestation, there is no such thing as zero-day threats.

It is somewhat ironic that Rutkwaska choose SVM as the ‘S’ in SVM stands for secure specifically because AMD introduced special processor extensions for dynamic attestation along side the virtualization extensions. Attestation depends heavily on the existence of a TPM chip and I should mention that Xen is, I believe, the first VMM to provide TPM virtualization which ought to enable all sorts of interesting security research to be done in Xen in the future.

Virtualization is particularly important for attestation because it provides a much smaller trusted computing base than a traditional operating system. In reality, virtualization provides a much strongers security platform than a traditional operating system would.

Update: Keith Adams, Virtual Machine Monitor (VMM) Engineeer at VMware, is back on topic from his personal blog. When Blue Pill research has been published he already labelled it as quasi-illiterate gibberish and now he’s reporting:

Well, first of all, SVM and VT make possible nothing that was not already possible before; VMware’s software-only products are an existence proof. The BluePill-istas don’t claim that SVM/VT make new exploits possible per se; rather, the claim is that SVM/VT make it possible to cloak the presence of a VMM rootkit completely.

Allow me to go on record: this claim is pure fantasy. In practice, it is always possible to detect the presence of a VMM, via timing attacks…

Second Update: After almost one year Blue Pill is again a popular topic. And Keith Adams, Virtual Machine Monitor (VMM) Engineer at VMware, slams Joanna Rutkowska claims once again:

…I’ve seen zero evidence that Rutkowska has pondered resource-based detection attempts like this, or indeed, any attacks more sophisticated than a “go-slow” loop between reads of the PIT. It is hard for me to imagine a “hypervisor” worthy of the name that doesn’t leave noticable traces in resource usage. In fact, to the degree that a hypervisor goes to heroic lengths to prevent such a detection technique, e.g., by running a hardware-accurate cache simulator on every guest memory access, it will only open up wider timing discrepancies for the guest’s HV-detector to exploit.

I can only conclude that in 2006 Rutkowska was either naive about the possibilities of such attacks, or that she consciously chose to make an outrageous and indefensible claim (“undetectable malware!!!!”) in order to draw attention to herself and her company. Given the peripheral evidence of Rutkowska’s competence, I think the evidence favors the latter, but I’d simply love to hear from her on the subject…



blog comments powered by Disqus


virtualization.info Newest articles
Release: Oracle VM VirtualBox 4.3.20

November 24th, 2014

Oracle has released a new version of its virtualization platform VM Virtualbox. Version 4.3.20 is considered a maintenance release which can be installed on top of version 4.3. The update…

Tech: Microsoft Infrastructure as a Service Foundations

November 20th, 2014

Microsoft has published a series of blog articles called the "Microsoft Infrastructure as a Service Foundations". The goal of the Infrastructure-as-a-Service (IaaS) Foundations series is to help enterprise IT…

AWS re:Invent Day 2 Keynote Wrap-Up

November 17th, 2014

The Day 2 at AWS re:Invent in Las Vegas saw on stage Verner Vogels, amazon.com CTO, in a keynote mostly focused on devs.
Two the key announcements:

Amazon EC2 Container…

AWS re:Invent Keynote Wrap-Up

November 13th, 2014

Yesterday at AWS re:Invent 2014 in Las Vegas, Andy Jassy (SVP, Amazon Web Services) announced, as expected, a set of new products and services that will be available to Amazon’s…

Release: Veeam Availability Suite v 8

November 12th, 2014

Veeam today announced the release of version 8 of its Availability Suite. It combines the Veeam Backup & Replication version 8 product together with Veeam ONE version 8, where Backup…

Release: Puppet Labs Puppet Enterprise 3.7

November 12th, 2014

Puppet Labs has released version 3.7 of its Puppet Enterprise. Puppet Enterprise is a Configuration Management platform using a model based, declarative approach build on top of Puppet which…

Midokura MidoNet goes Open Source

November 4th, 2014

Midokura is a Japanese startup that released, back in 2013, MidoNet a network virtualization solution for OpenStack.
Yesterday, at OpenStack Summit in Paris, the company announced the decision to…

Release: Red Hat Cloud Infrastructure 5

November 3rd, 2014

Red Hat today announced the release of version 5 of its systems management solution for Infrastructure as a Service (IaaS) private clouds based on the OpenStack platform, supporting OpenStack, Amazon…

Amazon releases AWS plugin for Microsoft System Center Virtual Machine Manager

October 30th, 2014

Amazon has released the AWS System Manager for Microsoft System Center Virtual Machine Manager (SCVMM). AWS System Manager is an add-in for SCVMM which allows customers to monitor and manager…

Paper: Project VRC: Phase VII – Impact of Microsoft Application Virtualization (App-V) 5.0, Optimizations and Best Practices

October 29th, 2014

Project VRC, an ititiative started by LogIn Consultants and PQR, has released a new Project Virtual Reality Check (VRC) whitepaper titled:”Phase VII – Impact of Microsoft Application Virtualization (App-V) 5.0,…

Release: Update Rollup 4 for Microsoft System Center 2012 R2

October 28th, 2014

Microsoft has released Update Rollup (UR) 4 for its System Center Suite of products. The update rollup can be installed on top of System Center 2012 R2 products and is…

Microsoft announcements from TechEd Europe 2014

October 28th, 2014

This week Microsoft is holding its annual TechEd Europe conference in Barcelona Spain. During the keynote which was held today Microsoft made several announcements. This posts gives an overview of…

Zerto expands technology for use with Hyper-V

October 28th, 2014

Zerto, provider of Zerto Virtual Replication (ZVR) has announced that its product will also support the Hyper-V virtualization platform from Microsoft. Virtual Replication does per VM replication and recovery…

Paper: Windows Server Technical Preview Step-by-Step Guide Storage Quality of Service

October 28th, 2014

Microsoft has released a paper titled:”Windows Server Technical Preview Step-by-Step Guide: Storage Quality of Service“. The paper which contains 16 pages covers a new Windows Server technology which became available…

 
Monthly Archive