Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Block access to link-local addresses from containers by default #8990

Closed
bgrant0607 opened this issue May 29, 2015 · 3 comments
Closed

Block access to link-local addresses from containers by default #8990

bgrant0607 opened this issue May 29, 2015 · 3 comments
Labels
area/security priority/backlog Higher priority than priority/awaiting-more-evidence. sig/network Categorizes an issue or PR as relevant to SIG Network.

Comments

@bgrant0607
Copy link
Member

GCE and AWS expose local metadata servers on a link-local address (169.254.169.254). This compromises isolation of containers from hosts and from the cluster. As with host ports, host networking, host paths, etc., we shouldn't expose these addresses by default. Authorization should be required.

Sadly, Google API clients apparently require metadata access currently, as reported in #8512.

cc @thockin @erictune @evandbrown

@bgrant0607 bgrant0607 added priority/backlog Higher priority than priority/awaiting-more-evidence. sig/network Categorizes an issue or PR as relevant to SIG Network. team/cluster labels May 29, 2015
@bgrant0607 bgrant0607 added this to the v1.0-post milestone May 29, 2015
@bgrant0607
Copy link
Member Author

Actually, the GCE API doesn't require the metadata server. The client just needs to explicitly provide the credentials in that case.

@evandbrown
Copy link

They don't require it, but manually managing (distributing, revoking, and rotating) service accounts and their credentials is a big step back IMO. If the secrets API can be jiggered to help here, great, just anything to keep folks from including keys in their images.

@bgrant0607
Copy link
Member Author

Dupe of #8867.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/security priority/backlog Higher priority than priority/awaiting-more-evidence. sig/network Categorizes an issue or PR as relevant to SIG Network.
Projects
None yet
Development

No branches or pull requests

2 participants