-
Notifications
You must be signed in to change notification settings - Fork 57
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Security hardening for kured #1237
Comments
I would be super happy to see us help here! 🚀 |
I think this would be a good opportunity for someone who wants to start contributing to upstream, especially because it’s important but not urgent. I’m happy to help with anything and leave this issue open for now. 😊 As background information, we found this issue by working on the seccomp-operator and evaluating possible applications where we could apply default profiles. Kured seems a good start and the profile could be contributed to the operator as well. This way we could simply utilize the operator later on to deploy default profiles in our products and in the wild. 😜 |
The kucero also have this issue. |
I am happy to contribute there, as I already am. However, I am not sure how we can avoid that, as we need to access host though. |
Paulo is working on a possible solution in kubereboot/kured#172. If that’s a feasible way then we can adapt our deployment too. 🙂 |
I think we should work on security hardening for the kured DaemonSet and maybe the application itself. It runs as privileged container which seems a more general security issue from my point of view:
skuba/internal/pkg/skuba/addons/kured.go
Line 158 in 1967cc7
The Weaveworks community is already aware of the issue and I would suggest:
WDYT?
The text was updated successfully, but these errors were encountered: