Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Security hardening for kured #1237

Open
saschagrunert opened this issue Jul 8, 2020 · 5 comments
Open

Security hardening for kured #1237

saschagrunert opened this issue Jul 8, 2020 · 5 comments

Comments

@saschagrunert
Copy link
Contributor

saschagrunert commented Jul 8, 2020

I think we should work on security hardening for the kured DaemonSet and maybe the application itself. It runs as privileged container which seems a more general security issue from my point of view:

privileged: true # Give permission to nsenter /proc/1/ns/mnt

The Weaveworks community is already aware of the issue and I would suggest:

  • Contribute to kured that we do not need to run it as privileged container any more (see security hardening kubereboot/kured#60)
  • Wrap-up a seccomp/AppArmor profile for kured to further security harden from a k8s perspective

WDYT?

@flavio
Copy link
Member

flavio commented Jul 10, 2020

I would be super happy to see us help here! 🚀

@saschagrunert
Copy link
Contributor Author

I think this would be a good opportunity for someone who wants to start contributing to upstream, especially because it’s important but not urgent. I’m happy to help with anything and leave this issue open for now. 😊

As background information, we found this issue by working on the seccomp-operator and evaluating possible applications where we could apply default profiles. Kured seems a good start and the profile could be contributed to the operator as well. This way we could simply utilize the operator later on to deploy default profiles in our products and in the wild. 😜

@jenting
Copy link

jenting commented Jul 11, 2020

The kucero also have this issue.

@evrardjp
Copy link
Contributor

I am happy to contribute there, as I already am. However, I am not sure how we can avoid that, as we need to access host though.

@saschagrunert
Copy link
Contributor Author

I am happy to contribute there, as I already am. However, I am not sure how we can avoid that, as we need to access host though.

Paulo is working on a possible solution in kubereboot/kured#172. If that’s a feasible way then we can adapt our deployment too. 🙂

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants