Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

gremlin.process encounters avc denials on OpenShift 4.2 #3

Closed
philgebhardt opened this issue Jun 23, 2021 · 1 comment
Closed

gremlin.process encounters avc denials on OpenShift 4.2 #3

philgebhardt opened this issue Jun 23, 2021 · 1 comment

Comments

@philgebhardt
Copy link
Collaborator

Background

OpenShift 4.2 appears to use Cri-O 1.14, which predates Cri-O/OpenShift issue openshift/origin#25488, where using the host's IPC/pid/net namespace forces the use of the spc_t process label. As such, this issue is currently undetectable in current versions of Cri-O/OpenShift.

For versions unaffected by the linked OpenShift issue, the gremlin.process process label produced by these SELinux policies is unable to invoke runc to create sidecars due to missing SELinux policies.

Reproduction

  1. Follow the described steps for installing Gremlin and these SELinux policies on OpenShift 4.2
  2. Try to attack a Kubernetes service

Expected: attacks work
Actual: attacks fail, avc denials can be found in /var/log/audit/audit.log

@philgebhardt
Copy link
Collaborator Author

fixed in v0.0.3

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant