-
Notifications
You must be signed in to change notification settings - Fork 307
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Improvement of Security Joint Assessment #3811
Comments
The project seems to overly trust different components in its architecture. It would be helpful to do things like ensure non-repudiation via signing many types of data that are sent. For instance, the secure hashes about which content to retrieve are only protected with transport layer security. If something goes wrong and a client has incorrect hash information, it is not possible to tell where the issue occurred without signed metadata from the manager. (Note that this is an isolated example of a more general problem we hope would be on the project’s roadmap.)
|
The project may consider implementing audit logging for security-sensitive actions (e.g. creation of PAT tokens or update of permissions for existing tokens) with clear traceability of the logged in user responsible for the activity. |
From a codebase standpoint, what sort of risks do different components have? You’re using a lot of libraries to do different crypto / network operations that are fairly complex. Is this likely to cause issues when zero days emerge in these libraries? What are you doing to harden this? (This is difficult and lower priority to fix, but should be a consideration when considering adding features)
|
From a codebase licensing standpoint, the project may address license issues flagged by FOSSA scans. |
It would be helpful for the project to utilize OpenSSF Scorecard as that does objective assessment of the security best practices of the project in a continuous/periodic way. |
Failure modes around filling the disk, slow retrieval, etc. need to be much better described as well so users can know what to expect. This can crash clients in unexpected ways or cause them to hang. How do you ensure that your adopters are aware of this risk and are mitigating the impact? |
Resistance / impact of network attacks like SMURF attacks, DoS, pollution attacks, etc. aren’t well described in the system. I would think this should be a major focus so adopters can understand how this changes their risk profile.
|
There should be explicit justification for the use of http instead of https. Given the low overhead for TLS, what is the need for supporting http? When should users use HTTP? What recommendations do you make around this? For example, if you use HTTP, should you still use basic access authentication?
cc @Liam-Zhao |
Certain k8s security best practices could be followed. The rationale for not following it is not clear. For e.g., why would certain hostPaths need to be mounted? Or why does privilege escalation need to be enabled by default?
|
Some components could use additional hardening: many individual components were found vulnerable in the security audit. Even beyond fixing those vulnerabilities, this seems like a good area of focus for improving the project security.
|
Feature request:
Refer to: cncf/tag-security#1443, cncf/toc#1358
The text was updated successfully, but these errors were encountered: