Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upUnikernel firewall VM #3792
Comments
andrewdavidwong
added
enhancement
C: other
help wanted
labels
Apr 6, 2018
andrewdavidwong
added this to the Far in the future milestone
Apr 6, 2018
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
Show comment
Hide comment
DemiMarie
Apr 8, 2018
MirageOS also has the advantage of being written predominantly in OCaml, which is memory safe. However, we need to check that
- it supports PVH (older versions only supported PV mode if I recall correctly)
- its Ethernet driver is hardened against a malicious netback (sys-net is not trusted)
- it performs adequately on real-world workloads (from what I can tell, MirageOS’s network stack is not very heavily optimized,
DemiMarie
commented
Apr 8, 2018
|
MirageOS also has the advantage of being written predominantly in OCaml, which is memory safe. However, we need to check that
|
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
ghost commentedApr 5, 2018
Qubes OS version: R4.0
This has been a GSOC proposal for a while, but didn't have an associated issue:
It might be worth switching the default sys-firewall VM image to a unikernel based one. The most likely unikernel candidate seems to be MirageOS.