Release: VMware Workstation 5.5.2

VMware released a minor update for Workstation, now reaching version 5.5.2 (build 29772), bringing in a broader support for host and guest OSes.

Host operating systems:

  • Windows Server 2003 R2, 32-bit, 64-bit
  • Mandriva Linux 2006, 32-bit, 64-bit
  • SUSE Linux Enterprise Server 10, 32-bit, 64-bit
  • SUSE Linux Enterprise Server 9 SP3, 32-bit, 64-bit
  • SUSE Linux 10.1, 32-bit, 64-bit
  • Red Hat Enterprise Linux 3.0 update 7, 32-bit, 64-bit
  • Red Hat Enterprise Linux 3.0 Update 8, 32-bit, 64-bit (experimental support)
  • Red Hat Enterprise Linux 4.0 Update 3, 32-bit, 64-bit
  • Red Hat Enterprise Linux 4.0 Update 4, 32-bit, 64-bit (experimental support)
  • Ubuntu Linux 6.06, 32-bit, 64-bit
  • Ubuntu Linux 5.10, 32-bit, 64-bit
  • Ubuntu Linux 5.04, 32-bit, 64-bit

Guest operating systems:

  • Windows Server 2003 R2, 32-bit, 64-bit
  • Mandriva Linux 2006, 32-bit, 64-bit
  • SUSE Linux Enterprise Server 10, 32-bit, 64-bit
  • SUSE Linux Enterprise Server 9 SP3, 32-bit, 64-bit
  • SUSE Linux 10.1, 32-bit, 64-bit
  • Red Hat Enterprise Linux 3.0 update 7, 32-bit, 64-bit
  • Red Hat Enterprise Linux 3.0 Update 8, 32-bit, 64-bit (experimental support)
  • Red Hat Enterprise Linux 4.0 Update 3, 32-bit, 64-bit
  • Red Hat Enterprise Linux 4.0 Update 4, 32-bit, 64-bit (experimental support)
  • Novell NetWare 6.5 SP5, 32-bit
  • FreeBSD 6.1, 32-bit, 64-bit (experimental support)
  • FreeBSD 6.0, 32-bit, 64-bit (experimental support)
  • Solaris x86 10, 10 Update 1, 32-bit, 64-bit
  • Ubuntu Linux 6.06, 32-bit, 64-bit
  • Ubuntu Linux 5.10, 32-bit, 64-bit
  • Ubuntu Linux 5.04, 32-bit, 64-bit

Download it here.

Whitepaper: A Comparison of Software and Hardware Techniques for x86 Virtualization

A very interesting whitepaper about differences between software-assisted and hardware-assisted virtualization has been published by VMware:

Until recently, the x86 architecture has not permitted classical trap-and-emulate virtualization. Virtual Machine Monitors for x86, such as VMware Workstation and Virtual PC, have instead used binary translation of the guest kernel code. However, both Intel and AMD have now introduced architectural extensions to support classical virtualization.

We compare an existing software VMM with a new VMM designed for the emerging hardware support. Surprisingly, the hardware VMM often suffers lower performance than the pure software VMM.
To determine why, we study architecture-level events such as page table updates, context switches and I/O, and find their costs vastly different among native, software VMM and hardware VMM execution.

We find that the hardware support fails to provide an unambiguous performance advantage for two primary reasons: first, it offers no support for MMU virtualization; second, it fails to co-exist with existing software techniques for MMU virtualization.We look ahead to emerging techniques for addressing this MMU virtualization problem in the context of hardware-assisted virtualization.

Read the whitepaper at source. Highly recommended.

Thanks to Keith Adams, co-author of this paper, for the news.

Novell defends Xen against Red Hat claims

Quoting from the ZDNet:


“If you look at the Xen open source project, we have been the number two contributor during the past 10 months or so to that project. So we’ve kind of contributed most of the enterprise readiness for the Xen platform,” Rex said.

“We had all the major hardware partners that had virtualisation hardware like IBM, Intel and AMD. They all stood up and said ‘Yes, this technology’s ready, and we fully support deployments based on Xen and in combination with SUSE Linux Enterprise 10’.”…

Read the whole article at source.

But if Novell is so sure Xen is ready for production deployment why is supporting it just when its own operating system is running on virtual machines?

Virtualization vendors to support new AMD Opteron Rev.F

Quoting from the AMD official announcement:

AMD today announced broad software industry support for its upcoming Next-Generation AMD Opteron processor family, which provides the ISV (independent software vendor) and open source software development communities with hardware support for the development of the next evolution of business-class enterprise applications.

“Customers and partners are demanding solutions that help them achieve business agility and advance their businesses with high-performance IT infrastructure,” said Bob Muglia, senior vice president of the Server and Tools Business at Microsoft Corp. “The Next-Generation AMD Opteron processor, along with current and future versions of Windows Server, will enhance software development and drive further adoption of the latest innovations in security, virtualization and management.”

VMware’s virtualization platform and AMD Opteron processor-based systems are combined today in some of the most advanced data centers, resulting in significant power savings and unprecedented resource consolidation,” said Brian Byun, vice president of Products and Alliances at VMware. “The Next-Generation AMD Opteron processor includes additional hardware support that further accentuates the benefits of VMware Infrastructure 3 as a true distributed platform for sharing resource transparently across the enterprise.”

“Back in early 2003, Novell worked alongside AMD to bring the first production-level 64-bit operating system to the enterprise market, and since that time, our collaboration on solutions for the open source community has remained very active,” said Roger Levy, vice president, Open Platform Solutions, at Novell. “AMD’s Next-Generation AMD Opteron processor platform will enable customers to take full advantage of virtualization features in the recently launched SUSE Linux Enterprise 10.”

AMD plans to announce the availability of the Next-Generation AMD Opteron on August 15, 2006.

Debunking Blue Pill myth

Since months the security and virtualization industry are discussing about a new security threat: the Blue Pill.

Blue Pill is the prototype resulting from a security study made by Joanna Rutkowska, which took advantage of new virtualization capabilities of AMD processors (known as SVM and previously as Pacifica) to inject a rootkit in a running Vista operating system (check the related Black Hat 2006 presentation).

The world press given this work much attention, often reporting misleading informations, because the scenario involved the upcoming Microsoft operating system, and because Ms. Rutkowska claimed a malware using this method is undetectable.

Assuming every reader out there already discovered, by reading follow-up to original post or other security professional analysis, that this method is not exploiting any flaw in the operating system, claim of undetectability stands still.

virtualization.info met Anthony Liguori, Software Engineer at IBM Linux Technology Center and, most of all, one of the men behind the Xen hypervisor, to finally debunk the Blue Pill myth.

virtualization.info: Anthony thank you for accepting to spend some time with virtualization.info and its readers.
First of all would you explain us your exact involvement in Xen project and since how much time you are working on this role?

Anthony Liguori: I’ve been working on the Xen project for approximately 2 years. Like most Xen hackers, I do a little bit of everything. I’m on an extended vacation right now but normally I’m fortunate enough to be a full time Xen hacker.

My primary interest in Xen is desktop virtualization. Recently, I’ve been involved in a number of desktop-related features including graphics virtualization and HVM VNC support. There are a number of interesting features that are in progress that I’m working on too such as HTTP block device support and a high performance graphics component.

In the past, I’ve been involved in Xen’s web services interface and the libvirt API.

I’ll also take this opportunity too to point out that my comments here are my own opinions and do not represent the opinions of IBM or the Xen project 🙂

VI: Let’s talk about the Blue Pill announcement: can you explain us in simple terms the scenario considered by the researcher?

AL: Rutkowska claims to have create a 100% undetectable piece of malware.

The basic idea behind her claim is that one could create a piece of malware that also was a Virtual Machine Monitor. If the VMM could take over the host Operating System (imagine if you could launch Xen on a running copy of Windows and instantly have the previous Windows system be a virtual machine), then it could potentially hide a virus from that virtual machine by remaining within the VMM.

Having a VMM take over a host operating system would be very difficult. It’s not outside of the realm of possibility but it would take a huge engineering effort.

However, for this malware to be successful, it would not only need to be able to take over the host Operating System, but it would also need to prevent that operating system from being able to detect that it was now a virtual machine.

While the former is at least possible (albeit tremendously difficult), the later is not possible which means that anti-malware software will always be able to detect this sort of attack.

VI: Where are risks in this scenario?

AL: If a virus cannot be removed or detected, it’s pretty much a worse case scenario for corporate security. Once there was an outbreak, you couldn’t trust any of your systems at all. I’m not sure how one could even mitigate such a threat–perhaps do frequent reinstalls of every system on your network?

It’s really a doomsday scenario which is why it’s gotten so much press.

Malware at the VMM level could potentially install keyloggers, provide remote access to disk, sniff passwords from a VM’s memory, pretty much anything evil thing that can be imagined.

VI: In your blog, Tales of a Code Monkey, you said Blue Pill claims are unfounded and malware is always detectable. Why?

AL: It’s been a fair bit of time since the post you are referring to. Since then, more details have come out about Rutkowska’s prototype. I should mention that this prototype is very detectable.

All it does is turn on SVM, and set up a small piece of memory that is called periodically. It makes no attempt, currently, to hide that memory from the operating system so one could simply search all of physical memory.

However, even if she builds a full VMM with proper memory protection (which is no small task), there would still be a way to detect it.

Hardware virtualization requires a technique know as “trap and emulation”. The idea is that the hardware traps certain instructions and the VMM emulates those instructions in such a way as to make the software believe it is running in a virtual machine.

Software emulation implies that these instructions take much longer to complete when executed under a VMM then on normal hardware. This fact is what can be used to detect the presence of a VMM.

I approached Rutkowska about this and she attempted to address it in her prototype by adjusting one of the processors clocks on every exit. However, there is nothing that she can due about external time sources and she’s admitted to this on her blog.

She refers to this as a theoritical weakness in her system but I assure you that it is quite practical to exploit.

Keep in mind too that this level of sophistication is not even necessary with the current Blue Pill prototype. She would have to get Blue Pill to the point where it was as good of a VMM as Xen or VMware ESX. That’s no small task!

This general approach can be used to detect any VMM–Xen, VMware, Virtual PC, z/OS, etc. In fact, this is a prediction from one of the earliest papers on virtualization (the Popek/Goldberg paper).

VI: Ms. Rutkowska stated several times that Blue Pill doesn’t exploit any bug at operating system level or hardware level. While this is true, do you think there is something vendors could do to prevent these kind of risks?

AL: I know that Thinkpads come with a BIOS setting to enable or disable virtualization technology. In fact, it is disabled by default.

I assume most vendors provide a BIOS setting to enable or disable VT/SVM. If a problem were found, vendors could simply disable the extension until AMD or Intel fixed the problem.

With that said, I strongly doubt this will ever be necessary.

VI: Ms. Rutkowska developed her prototype to work on machines where AMD SVM is available. Could this approach also work with Intel Virtualization Technology? If not why?

AL: Well, if this approach were valid (which it’s not), it would be equally applicable to VT. The two technologies, in their current forms, are almost completely identical except for some minor differences in performance characteristics.

VI: Looking at Ms. Rutkowaska demostration Austin Wilson, Director of the Windows Client Group at Microsoft, said the company will try to prevent such scenario in upcoming Vista operating system. What do you think can really be done at operating system level to mitigate the risk? Is this something also the Linux, BSD and Solaris communities should look at?

AL: I wouldn’t lose a bit of sleep over this particular threat. I don’t feel there is any new risk here at all.

There is some interesting security research on the horizon though and much of it has a huge intersection with virtualization.

A particularly interesting topic is attestation. Briefly, attestation is the ability to validate that the only software running at a moment in time is the software that is supposed to be there.

Currently, anti-malware software has to look specifically for known threats. Attestation lets you do something much stronger. Attestation allows you to validate that there is no unknown threats.

Imagine anti-virus software that doesn’t need to be updated–ever. With attestation, there is no such thing as zero-day threats.

It is somewhat ironic that Rutkwaska choose SVM as the ‘S’ in SVM stands for secure specifically because AMD introduced special processor extensions for dynamic attestation along side the virtualization extensions. Attestation depends heavily on the existence of a TPM chip and I should mention that Xen is, I believe, the first VMM to provide TPM virtualization which ought to enable all sorts of interesting security research to be done in Xen in the future.

Virtualization is particularly important for attestation because it provides a much smaller trusted computing base than a traditional operating system. In reality, virtualization provides a much strongers security platform than a traditional operating system would.

Update: Keith Adams, Virtual Machine Monitor (VMM) Engineeer at VMware, is back on topic from his personal blog. When Blue Pill research has been published he already labelled it as quasi-illiterate gibberish and now he’s reporting:

Well, first of all, SVM and VT make possible nothing that was not already possible before; VMware’s software-only products are an existence proof. The BluePill-istas don’t claim that SVM/VT make new exploits possible per se; rather, the claim is that SVM/VT make it possible to cloak the presence of a VMM rootkit completely.

Allow me to go on record: this claim is pure fantasy. In practice, it is always possible to detect the presence of a VMM, via timing attacks…

Second Update: After almost one year Blue Pill is again a popular topic. And Keith Adams, Virtual Machine Monitor (VMM) Engineer at VMware, slams Joanna Rutkowska claims once again:

…I’ve seen zero evidence that Rutkowska has pondered resource-based detection attempts like this, or indeed, any attacks more sophisticated than a “go-slow” loop between reads of the PIT. It is hard for me to imagine a “hypervisor” worthy of the name that doesn’t leave noticable traces in resource usage. In fact, to the degree that a hypervisor goes to heroic lengths to prevent such a detection technique, e.g., by running a hardware-accurate cache simulator on every guest memory access, it will only open up wider timing discrepancies for the guest’s HV-detector to exploit.

I can only conclude that in 2006 Rutkowska was either naive about the possibilities of such attacks, or that she consciously chose to make an outrageous and indefensible claim (“undetectable malware!!!!”) in order to draw attention to herself and her company. Given the peripheral evidence of Rutkowska’s competence, I think the evidence favors the latter, but I’d simply love to hear from her on the subject…

iEmulator to fill Microsoft void in Mac OS virtualization

After the Microsoft dismission of Virtual PC for Mac OS companies are starting to fight for market share.
iEmulator, based on QEMU, is the second one after Parallels to offer a product. VMware will come.

Quoting from the iEmulator official announcement:

iEmulator 1.7.9, a leading high-performance emulation solution, is now available to all Microsoft Virtual PC owners at the special price of $19.95. This upgrade price includes the full iEmulator application, comprehensive documentation, a version of DOS, unlimited no-charge updates to iEmulator and rapid-response technical support.

In addition, iEmulator can import Virtual PC 7 emulated PCs that use static-sized hard disk images, in many cases without requiring any editing of the imported PC…

Event: VMware VMworld 2006

VMware finally published sessions list for this year VMworld conference.

As already anticipated by virtualization.info the event will be particularly interesting for the show of two new products: Workstation 6.0 and ACE 2.0.
But sessions list reveals another 2 products highly expected from customers:

Instead there are no traces of next generation P2V Assistant (possibly called VirtualCenter System Image) or the misterious Integrity.

This year virtualization.info will be present at the event.
After 3 years of blogging about this industry segment I’ll be there to meet readers, journalists, customers, integrators and distributors, vendors and everybody else wants to talk about the virtualization market.
I’ll look for all of you!

The whole event is composed by 127 sessions so far, splitted between 6 tracks, but only 44 are presented by VMware speakers.

Emerging topics obviously relates to new products so we find interesting sessions like:

  • Workstation 6 and Beyond: Sneak Preview
    VMware Workstation 6.0 and future releases will offer groundbreaking new ways to further unleash the power of virtualization. This session offers an in-depth look at key new features in the upcoming release of Workstation 6. In addition, a simple demo highlights some of these features and how they can be effectively utilized in your technical organization.
  • Virtual Appliance Authoring with VMware ACE
    VMware technologies in the ACE, Player and Workstation family provide an exciting new way to distribute software. Virtual appliances are preconfigured virtual machines providing a ready-to-run application or service that operates on any VMware platform with minimal configuration. This session explains what a virtual appliance is, how VMware technologies help create and deploy virtual appliances, and what products, features and technologies are involved.
  • Extending Your Domain Outside the Corporate Network with VMware ACE
    Supporting users outside the corporate network usually means some combination of degraded access for the users, security compromises, or expensive additional equipment. With VMware ACE, you can take advantage of the VPN and directory infrastructure you already have and extend it to users anywhere. Topics of discussion include: the problems managing resources outside the domain without VMware ACE, VMware ACE management and guest networking features, how the combination of ACE, VPN and AD can allow machines anywhere to communicate and act exactly as if they’re part of the internal network, and how these remote VMs can be managed using traditional management software.
  • Virtual Lab Automation: Automating the Self-Service Setup, Capture and Teardown of Complex, Multi-Machine Software Configurations on a Pool of Shared VMware ESX Server Hosts
    This session explains the benefits and key technical requirements of a Virtual Lab Automation (VLA) system built on VMware virtual infrastructure software. Application development and IT organizations are grappling with server sprawl, setup and provisioning overhead, costly system failures, and difficulties reproducing and correcting software defects discovered in remote development facilities, or by outsourcing partners. Virtual Lab Automation substantially mitigates these problems by automating the setup and teardown of complex, multi-machine software configurations on a centralized pool of VMware ESX Servers shared by the application development and QA teams in an enterprise. These operations are performed in a self-service manner by developers and QA engineers, relieving the tedious provisioning burden often shouldered by the IT organization. Attendees will leave the session with a clear understanding of the capabilities and benefits of Virtual Lab Automation.
  • VMmark: A Scalable Benchmark for Virtualized Systems
    This session explains why benchmarking virtual infrastructure is difficult and why it is important for hardware and software evaluation and capacity planning. VMware is working to measure and understand system performance in virtualized datacenters. Virtualized environments are not well measured by traditional benchmarking methodologies, which focus on driving a single workload to full system utilization. An appropriate virtual machine benchmark should employ realistic, diverse workloads and generate an easily understandable metric that scales with the hardware capacity of the underlying system. This session presents VMmark, a viable benchmarking solution, and includes benchmark results from several hardware platforms.

Apart these ones another major theme seems to be Virtual Appliance, confirming VMware is heading to the concept of service virtualization (otherwise called Software as a Service or SaaS).

A last mention for another couple of sessions critical for future development of virtualization industry:

  • VMware and Hardware Assist Technology (Intel VT and AMD Pacifica)
    Intel and AMD have begun shipping CPU extensions to assist with virtualization. In this session, presenters provide an overview of these microprocessor virtualization extensions – specifically Intel VT and AMD Pacifica – and discuss what capabilities are enabled by each generation of hardware assist. Learn how VMware products are using these new capabilities.
  • VMware VMI Paravirtualization
    Paravirtualization, a process in which a guest operating system is ported to run on a virtualization layer, provides the opportunity to increase guest performance. VMware has proposed the VMI paravirtualization interface for inclusion in the Linux kernel and has an associated hypervisor under development. VMware’s paravirtualization work and its associated performance are compared with that of Xen paravirtualization, which is included in some Linux distributions.

Check the whole sessions list here. Register for VMworld 2006 here.

moka5 starts LivePC beta program

A new startup in the virtualization scene, moka5, appeared on virtualization.info on May this year with the claim it can provide further technology innovation in the space.

The company, spin-off from Stanford University’s Computer Science Department, is now launching a preview of its technology, called LivePC.

LivePC brings the rising concept of service virtualization (or Software as a Service, aka SaaS), these days so much hyped thanks to VMware Virtual Appliances, at its maximum.

Being delivered in two versions, for Windows and for bare metal installations (like VMware ESX Server does), LivePC enterely depends on VMware Player.
It’s able to import existing virtual machines or to create new ones with a very basic .vmx generator, but final product are always pure VMware virtual machines.

moka5 wrapper doesn’t add anything to the execution of the virtual machine, so we can’t consider LivePC a real virtualization platform, but introduces the concept of virtual machine subscription.

Once imported or created a virtual machine LivePC permits to package it in a redistributable format and upload it on a web server.
At this point the new virtual machine coordinates can be published on a moka5 online library, acting as a catalog.

Selecting the choosen LivePC from the library users will be able to download the related feed and subscribe it at their desktop.
Immediately after feed subscription the application starts downloading the real virtual machine from its online location to the local computer.
The first download and is streamed from the downloading location, so users can start using the virtual machine before it’s completely copied locally.

Anytime a new version of the virtual machine is available, LivePC checks the feed and updates the local copy (at the moment is unclear if it downloads again the whole image or only bits changed in the virtual disk).

LivePC seems at a very early stage of development but appears pretty interesting, mixing together server virtualization, virtual appliances and application streaming approaches with social networking elements.

An immediate concern about licensing issues with Windows-based virtual machines raises, since this can be considered a form of redistribution, which Microsoft EULA prohibits.

The beta program is still open for enrollment: register here.

The virtualization.info Virtualization Industry Roadmap has been updated accordingly.

moka5 has been included in the virtualization.info Virtualization Industry Radar.

Tech: VMware suffering serious performance degradation in Infrastructure 3

Since a couple of week on VMTN forums a new thread is collecting much attention from most experienced VMware users.

A customer posted some benchmarks after testing different SAN I/O operations with ESX Server 3.0, revealing a serious performance degradation appears when a virtual machine is moved from a LUN to another.

Other notable experts confirmed same behaviour and also notified general performance of VMFS3, the new file system introduced with this release, went worse during the all beta cycle.

Even if the issue seems to appear in more than one scenario VMware, monitoring threads on forums, recognized the problem depending on VirtualCenter and it’s already working on a fix.

If you have experiencing same problems help to deliver a better patch opening a support request and posting your findings on the original thread.

Lxlabs to support OpenVZ, Xen and Microsoft Virtual Server on its HyperVM

Quoting from the Lxlabs official announcement:

Lxlabs, the makers of the Lxadmin web hosting control panel, today announced the immediate availability of HyperVM 1.2, a multi tiered, distributed web based management software targeted at VPS hosting companies.

HyperVM, which currently supports openVZ, will support Xen and MS Virtual Server in the short future, and provides a very easy method for the hosting companies to setup and delegate their vps management, thereby providing the most effective way to monetize on the fast growing vps market…

As expected the market is starting to require and produce multi-platoform virtualization managers.

Why Lxlabs didn’t announce VMware Server support as well?