GithubHelp home page GithubHelp logo

security hardening about kured HOT 8 CLOSED

kubereboot avatar kubereboot commented on July 21, 2024 4
security hardening

from kured.

Comments (8)

adhodgson1 avatar adhodgson1 commented on July 21, 2024 9

In addition I am wondering whether we could tighten up the privileged container access by removing some of the unneeded Linux capabilities to help reduce the scope of the container?

from kured.

arianmotamedi avatar arianmotamedi commented on July 21, 2024

There hasn't been any activity on this in a while but do we know what the minimum set of requirements for the container to run are? Ideally we shouldn't have to run it as root.

from kured.

bboreham avatar bboreham commented on July 21, 2024

@kfox1111 no plans to add a separate service in this project.
Making the locked object independent of the daemonset seems like a good idea - could be a runtime parameter?

from kured.

evrardjp avatar evrardjp commented on July 21, 2024

I think this might be partially linked to #25

from kured.

evrardjp avatar evrardjp commented on July 21, 2024

I have a PoC code that uses the NodeRestriction Admission controller [1], but sadly I had to map the host's kubelet conf and certs into the container, which means that it probably has more access than before... (secrets?). So that's probably not a good idea.

Does anyone have a better idea, that doesn't involve writing a new service/operator?

1: evrardjp@18eb857

from kured.

kfox1111 avatar kfox1111 commented on July 21, 2024

That still sounds like it has better security then the existing solution. In the existing solution, you already have access to all the node's secrets as you can just tweak the deployment to give your pod access to the whole nodes filesystem. You can also tweak the deployment to give you access to other secrets in the same namespace it may not already have access to.

Long term, I'd like to see an option to restrict service accounts to nodes using the NodeRestriction Admission controller. This problem is not specific to kured, but csi drivers, cni drivers, some monitoring plugins, logging, etc all suffer from this same issue. This will need a KEP in Kubernetes.

from kured.

evrardjp avatar evrardjp commented on July 21, 2024

Totally agreed on the last bit.

from kured.

github-actions avatar github-actions commented on July 21, 2024

This issue was automatically considered stale due to lack of activity. Please update it and/or join our slack channels to promote it, before it automatically closes (in 7 days).

from kured.

Related Issues (20)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.