Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Kubernetes API Server Bypass Risks #42

Closed
raesene opened this issue Mar 11, 2022 · 7 comments
Closed

Kubernetes API Server Bypass Risks #42

raesene opened this issue Mar 11, 2022 · 7 comments
Assignees
Labels
sig/docs Categorizes an issue or PR as relevant to SIG Docs. sig/security Categorizes an issue or PR as relevant to SIG Security.

Comments

@raesene
Copy link
Contributor

raesene commented Mar 11, 2022

Based on a suggestion from @JimBugwadia on slack an idea for a good page on the Kubernetes website would be to collate configurations or privileges which could allow a malicious user or attacker to bypass the API server. As many key security controls (e.g. Auditing and admission control) are handled at the API server layer, attacks which bypass it can present a serious risk to cluster security.

Some examples :-

  • node/proxy rights at the cluster level can allow users to directly communicate with the kubelet API, bypassing the API server.
  • To an extent users being able to create static pods bypasses some API server controls
  • Direct access to the etcd database will effectively allow attackers to retrieve things like secrets without that access being visible in API server audit logs.

/sig security docs

@k8s-ci-robot k8s-ci-robot added sig/security Categorizes an issue or PR as relevant to SIG Security. sig/docs Categorizes an issue or PR as relevant to SIG Docs. labels Mar 11, 2022
@k8s-triage-robot
Copy link

The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs.

This bot triages issues and PRs according to the following rules:

  • After 90d of inactivity, lifecycle/stale is applied
  • After 30d of inactivity since lifecycle/stale was applied, lifecycle/rotten is applied
  • After 30d of inactivity since lifecycle/rotten was applied, the issue is closed

You can:

  • Mark this issue or PR as fresh with /remove-lifecycle stale
  • Mark this issue or PR as rotten with /lifecycle rotten
  • Close this issue or PR with /close
  • Offer to help out with Issue Triage

Please send feedback to sig-contributor-experience at kubernetes/community.

/lifecycle stale

@k8s-ci-robot k8s-ci-robot added the lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. label Jun 9, 2022
@savitharaghunathan
Copy link
Member

/remove-lifecycle stale

@k8s-ci-robot k8s-ci-robot removed the lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. label Jul 7, 2022
@savitharaghunathan
Copy link
Member

/assign @raesene

@raesene
Copy link
Contributor Author

raesene commented Jul 13, 2022

I've put some initial thoughts for this in a hackmd here feel free to add/suggest changes :)

Once we've gathered some ideas, we can create a PR for k/website to get wider feedback

@p4ck3t0
Copy link

p4ck3t0 commented Jul 13, 2022

What is about the pause container? An attacker who can change the pause container image, also bypasses the API? 🤔
Is that something we could add to that list?

@raesene
Copy link
Contributor Author

raesene commented Jul 13, 2022

@p4ck3t0 so at the moment we're focusing more on how things are changed rather than what they'd change, but you raise a good point, in that people could modify container images either on-host or via the CRI daemon, and that's definitely worth including.

@raesene
Copy link
Contributor Author

raesene commented Sep 6, 2022

This has been merged now woooo kubernetes/website#35908

@raesene raesene closed this as completed Sep 6, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
sig/docs Categorizes an issue or PR as relevant to SIG Docs. sig/security Categorizes an issue or PR as relevant to SIG Security.
Projects
None yet
Development

No branches or pull requests

5 participants