Priorities for OpenXT Derivative Appliances

(A) OpenEmbedded Jethro Migration


(B) SecureView roadmap/schedule dependencies may reduce near-term testing and development capacity for Jethro stabilization

OpenXT Platform Definition

(A)  Discussion of development process, governance, discovery of base platform properties and definition of optional use case layers:


(B)  Discussion of a possible scenario to incrementally rebuild the platform using upstream projects and components. The following summary was provided by M. Gregory, without assertions on feasibility or timeline.

OpenXT Rebuild: A Thought Experiment

The goal of this exercise is to understand the fundamental design choices that were made in the development of OpenXT. Additionally, the information documented as a part of this exercise will be valuable in refactor the OpenXT project.

1. Enumerate the functional requirement s for OpenXT

2. Enumerate the security requirements

3. Enumerate any constraints

Start with a small “runnable” OpenXT system of an initramfs and dom0. Identify the core image functionality for booting the system and strip out all other functionality. Upstream images like xen-image-minimal may serve as a good comparisons. Identify and document the functional and security requirements met by the initramfs and dom0 base system.

Add a core service VM, like UIVM, back into the system. Identify the functional and security requirements that the UIVM meets. Use the requirements to identify the core functionality. Strip the UIVM domain down to its core functionality needed for the current system and to meet identified requirements. Enumerate all new functional and security requirements that stem from the addition of the core UVIM. For instance, a new security requirement stating that only the UIVM has access to the graphic and input devices.

Add in code to support interactions between the Dom0 and the UIVM. The code that is added by into the build should be grouped into services or functional units. Evaluate each functional unit against identified security properties ensuring they are not violated. Additionally, document alternatives to the functional units. For example, v4v would be functional unit providing inter-VM communication.

This process should continue until all domains and functionality has been added back into the system. The results of this process will be a “complete” set of functional and security requirements, as well as a design tree. The design tree will contain all design choices as well as alternatives.