Prevent remote proxies from impersonating users from different clusters#33536
Merged
Prevent remote proxies from impersonating users from different clusters#33536
Conversation
This PR prevents root proxies from impersonating users from different clusters when accessing a leaf cluster.
During authentication, the proxy presents its certificate and sends the impersonation header.
A malicious attacker in possession of the root cluster proxy cert-key pair could bypass the root-leaf cluster permissions boundary by impersonating local users. This PR prevents that and remote proxies can only impersonate users belonging to their cluster.
KubeCSR Flow:
```mermaid
sequenceDiagram
ROOT PROXY->>+LEAF PROXY: Forward the request identity cert
LEAF PROXY ->> LEAF AUTH SRV: Sign identity via KubeCSR
LEAF AUTH SRV -->> LEAF PROXY: Identity cert
LEAF PROXY ->> LEAF KUBE SERVICE: Forward the request using cert
LEAF KUBE SERVICE -->> LEAF PROXY: Return response
LEAF PROXY -->> ROOT PROXY: Return response
```
Impersonation Flow:
```mermaid
sequenceDiagram
ROOT PROXY->>+LEAF PROXY: Forward the request identity by Impersonating
LEAF PROXY ->> LEAF KUBE SERVICE: Forward the request identity by Impersonating
LEAF KUBE SERVICE -->> LEAF PROXY: Return response
LEAF PROXY -->> ROOT PROXY: Return response
```
Fixes gravitational/teleport-private#968
Signed-off-by: Tiago Silva <tiago.silva@goteleport.com>
r0mant
approved these changes
Oct 16, 2023
rosstimothy
approved these changes
Oct 16, 2023
| if proxyClusterName != "" && | ||
| proxyClusterName != clusterName.GetClusterName() && | ||
| proxyClusterName != identityClusterName { | ||
| log.Warnf("received Kube CSR for %v", identityClusterName) |
Contributor
There was a problem hiding this comment.
What is this warning telling users? Should the message contain similar wording to the error returned below?
rosstimothy
reviewed
Oct 16, 2023
fa93cd1 to
98f59a9
Compare
This was referenced Oct 16, 2023
tigrato
added a commit
that referenced
this pull request
Oct 16, 2023
…rs (#33536) * Prevent remote proxies from impersonating users from different clusters This PR prevents root proxies from impersonating users from different clusters when accessing a leaf cluster. During authentication, the proxy presents its certificate and sends the impersonation header. A malicious attacker in possession of the root cluster proxy cert-key pair could bypass the root-leaf cluster permissions boundary by impersonating local users. This PR prevents that and remote proxies can only impersonate users belonging to their cluster. KubeCSR Flow: ```mermaid sequenceDiagram ROOT PROXY->>+LEAF PROXY: Forward the request identity cert LEAF PROXY ->> LEAF AUTH SRV: Sign identity via KubeCSR LEAF AUTH SRV -->> LEAF PROXY: Identity cert LEAF PROXY ->> LEAF KUBE SERVICE: Forward the request using cert LEAF KUBE SERVICE -->> LEAF PROXY: Return response LEAF PROXY -->> ROOT PROXY: Return response ``` Impersonation Flow: ```mermaid sequenceDiagram ROOT PROXY->>+LEAF PROXY: Forward the request identity by Impersonating LEAF PROXY ->> LEAF KUBE SERVICE: Forward the request identity by Impersonating LEAF KUBE SERVICE -->> LEAF PROXY: Return response LEAF PROXY -->> ROOT PROXY: Return response ``` Fixes gravitational/teleport-private#968 Signed-off-by: Tiago Silva <tiago.silva@goteleport.com> * fix message
github-merge-queue Bot
pushed a commit
that referenced
this pull request
Oct 31, 2023
…rs (#33536) (#33542) * Prevent remote proxies from impersonating users from different clusters This PR prevents root proxies from impersonating users from different clusters when accessing a leaf cluster. During authentication, the proxy presents its certificate and sends the impersonation header. A malicious attacker in possession of the root cluster proxy cert-key pair could bypass the root-leaf cluster permissions boundary by impersonating local users. This PR prevents that and remote proxies can only impersonate users belonging to their cluster. KubeCSR Flow: ```mermaid sequenceDiagram ROOT PROXY->>+LEAF PROXY: Forward the request identity cert LEAF PROXY ->> LEAF AUTH SRV: Sign identity via KubeCSR LEAF AUTH SRV -->> LEAF PROXY: Identity cert LEAF PROXY ->> LEAF KUBE SERVICE: Forward the request using cert LEAF KUBE SERVICE -->> LEAF PROXY: Return response LEAF PROXY -->> ROOT PROXY: Return response ``` Impersonation Flow: ```mermaid sequenceDiagram ROOT PROXY->>+LEAF PROXY: Forward the request identity by Impersonating LEAF PROXY ->> LEAF KUBE SERVICE: Forward the request identity by Impersonating LEAF KUBE SERVICE -->> LEAF PROXY: Return response LEAF PROXY -->> ROOT PROXY: Return response ``` Fixes gravitational/teleport-private#968 Signed-off-by: Tiago Silva <tiago.silva@goteleport.com> * fix message
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR prevents root proxies from impersonating users from different clusters when accessing a leaf cluster.
During authentication, the proxy presents its certificate and sends the impersonation header.
A malicious attacker in possession of the root cluster proxy cert-key pair could bypass the root-leaf cluster permissions boundary by impersonating local users. This PR prevents that and remote proxies can only impersonate users belonging to their cluster.
KubeCSR Flow:
sequenceDiagram ROOT PROXY->>+LEAF PROXY: Forward the request identity cert LEAF PROXY ->> LEAF AUTH SRV: Sign identity via KubeCSR LEAF AUTH SRV -->> LEAF PROXY: Identity cert LEAF PROXY ->> LEAF KUBE SERVICE: Forward the request using cert LEAF KUBE SERVICE -->> LEAF PROXY: Return response LEAF PROXY -->> ROOT PROXY: Return responseImpersonation Flow:
sequenceDiagram ROOT PROXY->>+LEAF PROXY: Forward the request identity by Impersonating LEAF PROXY ->> LEAF KUBE SERVICE: Forward the request identity by Impersonating LEAF KUBE SERVICE -->> LEAF PROXY: Return response LEAF PROXY -->> ROOT PROXY: Return responseContributes to gravitational/teleport-private#968
Signed-off-by: Tiago Silva tiago.silva@goteleport.com