X-Git-Url: http://git.annexia.org/?a=blobdiff_plain;f=src%2Fguestfs.pod;h=fc58f4f1f04129b6063529f7da4c0ba19e843ae5;hb=fab75c0337d7897d10ea5e95e47ac05eab81ace9;hp=83709827d3d832e9a531e61b7be805cede018ac5;hpb=35afe0cb33c986bf595585a716ff259cf3415a1f;p=libguestfs.git diff --git a/src/guestfs.pod b/src/guestfs.pod index 8370982..fc58f4f 100644 --- a/src/guestfs.pod +++ b/src/guestfs.pod @@ -1095,6 +1095,14 @@ data. Callers should be careful to escape these before printing them to a structured file (for example, use HTML escaping if creating a web page). +Guest configuration may be altered in unusual ways by the +administrator of the virtual machine, and may not reflect reality +(particularly for untrusted or actively malicious guests). For +example we parse the hostname from configuration files like +C that we find in the guest, but the guest +administrator can easily manipulate these files to provide the wrong +hostname. + The inspection API parses guest configuration using two external libraries: Augeas (Linux configuration) and hivex (Windows Registry). Both are designed to be robust in the face of malicious data, although