Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

All remote resources should be fetched over HTTPS #128

Closed
ghost opened this issue Jun 17, 2014 · 10 comments
Closed

All remote resources should be fetched over HTTPS #128

ghost opened this issue Jun 17, 2014 · 10 comments
Assignees
Labels
area/security kind/bug Categorizes issue or PR as related to a bug. priority/backlog Higher priority than priority/awaiting-more-evidence. sig/cluster-lifecycle Categorizes an issue or PR as relevant to SIG Cluster Lifecycle.

Comments

@ghost
Copy link

ghost commented Jun 17, 2014

There's a whole lot of stuff being downloaded/connected to over HTTP instead of HTTPS, this should be either configurable or ideally done via HTTPS by default.

@jbeda
Copy link
Contributor

jbeda commented Jun 17, 2014

@kseifriedredhat Totally agree -- can you point to stuff as you see it and we'll fix it up. Or send a PR.

Thanks!

@jbeda jbeda added the bug label Jun 17, 2014
@jbeda jbeda changed the title HTTP vs. HTTPS All remote resources should be fetched over HTTPS Jun 17, 2014
@ghost
Copy link
Author

ghost commented Jun 17, 2014

Just grep the source, so for example:

./kubernetes-master/cluster/saltbase/salt/kube-proxy/default:DAEMON_ARGS="$DAEMON_ARGS
--etcd_servers=http://{{ ips[0][0] }}:4001"
./kubernetes-master/cluster/saltbase/salt/kubelet/default:DAEMON_ARGS="$DAEMON_ARGS
-etcd_servers=http://{{ ips[0][0] }}:4001 -address=$HOSTNAME"
./kubernetes-master/cluster/saltbase/salt/apiserver/default:DAEMON_ARGS="$DAEMON_ARGS
-etcd_servers=http://{{ ips[0][0] }}:4001"
./kubernetes-master/cluster/saltbase/salt/controller-manager/default:DAEMON_ARGS="$DAEMON_ARGS
-etcd_servers=http://{{ ips[0][0] }}:4001"

@jbeda
Copy link
Contributor

jbeda commented Jun 17, 2014

Those are all intra-cluster communication. In the typical deployment none of those would be going over a WAN link. While ideally that stuff would be over TLS also, distributing key material in a secure way becomes difficult in an automated way.

I'd prioritize places where we grab resources over the internet over securing intra-cluster communication.

@jbeda
Copy link
Contributor

jbeda commented Jun 17, 2014

I filed #129 to track intra-cluster communication.

@bgrant0607 bgrant0607 added the priority/backlog Higher priority than priority/awaiting-more-evidence. label Dec 3, 2014
@davidopp davidopp added the sig/cluster-lifecycle Categorizes an issue or PR as relevant to SIG Cluster Lifecycle. label Feb 8, 2015
@bgrant0607 bgrant0607 added this to the v1.0 milestone Feb 28, 2015
@goltermann goltermann modified the milestones: v1.0, High Pri Bug fix-it Mar 10, 2015
@a-robinson
Copy link
Contributor

Is this meant to now refer to communication from the client rather than from the node components? If not, then it and #129 are covering the same thing and this should be closed.

@ghost
Copy link
Author

ghost commented Mar 12, 2015

If you replace all these with TLS via #129 then yes, that would cover this. Does your documentation specifically state that the intra cluster nodes need to have a trusted network, becauce if not this should probably be given a CVE.

@alex-mohr
Copy link
Contributor

TODO: audit code for all usage of http instead of https and file separate issues for each non-benign one. E.g. apiserver to same machine etcd is fine via http.

@erictune
Copy link
Member

This audit was done and reported in #129

@roberthbailey
Copy link
Contributor

The intra-cluster audit was covered in #129 and I've done an audit over cluster initialization scripts here and sent PRs to fix a couple of easy cases and filed separate bugs for the remaining occurrences. Marking this issue as fixed.

@roberthbailey roberthbailey self-assigned this Apr 27, 2015
vishh pushed a commit to vishh/kubernetes that referenced this issue Apr 6, 2016
Return an empty state for old versions of Docker.
Crazykev pushed a commit to Crazykev/kubernetes that referenced this issue Sep 10, 2016
MikeSpreitzer added a commit to MikeSpreitzer/kubernetes that referenced this issue May 3, 2017
Demonstrates how to list and watch third party objects (i.e., objects
of a Kind defined by a ThirdPartyResource).

This makes a tiny contribution towards client-go issue kubernetes#128
MikeSpreitzer added a commit to MikeSpreitzer/kubernetes that referenced this issue May 4, 2017
Demonstrates how to list and watch third party objects (i.e., objects
of a Kind defined by a ThirdPartyResource).

This makes a tiny contribution towards client-go issue kubernetes#128
peebs pushed a commit to peebs/kubernetes that referenced this issue May 5, 2017
lazypower pushed a commit to lazypower/kubernetes that referenced this issue May 19, 2017
…-config

Update client config to use admin token
k8s-github-robot pushed a commit that referenced this issue Oct 25, 2017
Automatic merge from submit-queue. If you want to cherry-pick this change to another branch, please follow the instructions <a href="https://github.com/kubernetes/community/blob/master/contributors/devel/cherry-picks.md">here</a>.

client-go/examples: Update CRUD Deployment sample

**What this PR does / why we need it**: 
PR motivated by [#128](kubernetes/client-go#128), namely updating the CRUD example with the following:
- Add new step which demonstrates rolling back deployments 
- Cleanup retry loop for `Update()` steps
- Make `-kubeconfig` flag optional when running example (same as out-of-cluster example)
- Update `README.md` to reflect changes 

**Special notes for your reviewer**:
My first Kubernetes contribution- feedback very welcome!

**Release note**:

```release-note
NONE
```

/cc @ahmetb @caesarxuchao
wking pushed a commit to wking/kubernetes that referenced this issue Jul 21, 2020
b3atlesfan pushed a commit to b3atlesfan/kubernetes that referenced this issue Feb 5, 2021
pjh pushed a commit to pjh/kubernetes that referenced this issue Jan 31, 2022
ncdc added a commit to ncdc/kubernetes that referenced this issue Jan 27, 2023
Update kcp-dev/kubernetes requirement for cel-go
linxiulei pushed a commit to linxiulei/kubernetes that referenced this issue Jan 18, 2024
change NPD port as there is a port collision with kube-proxy
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/security kind/bug Categorizes issue or PR as related to a bug. priority/backlog Higher priority than priority/awaiting-more-evidence. sig/cluster-lifecycle Categorizes an issue or PR as relevant to SIG Cluster Lifecycle.
Projects
None yet
Development

No branches or pull requests

8 participants