Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

images/tests: Globally-writeable /etc/passwd #22592

Merged
merged 1 commit into from
Apr 18, 2019

Conversation

wking
Copy link
Member

@wking wking commented Apr 17, 2019

This lets us SSH from the teardown container into the cluster without hitting:

$ ssh -A core@$bootstrap_ip
No user exists for uid 1051910000

OpenSSH has a very early getpwuid call with no provision for bypassing via HOME or USER environment variables like we did for Bazel. OpenShift runs with the random UIDs by default:

By default, all containers that we try and launch within OpenShift, are set blocked from “RunAsAny” which basically means that they are not allowed to use a root user within the container. This prevents root actions such as chown or chmod from being run and is a sensible security precaution as, should a user be able to perform a local exploit to break out of the container, then they would not be running as root on the underlying container host. NB what about user-namespaces some of you are no doubt asking, these are definitely coming but the testing/hardening process is taking a while and whilst companies such as Red Hat are working hard in this space, there is still a way to go until they are ready for the mainstream.

while Kubernetes sorts out user namespacing. Despite the high UIDs, all users on the cluster are GID 0, so the g+w is sufficient (vs. a+w), and maybe this mitigates concerns about increased writability for such an important file. The main mitigation is that these are throw-away CI containers, and not long-running production containers where we are concerned about malicious entry.

A more polished fix has landed in CRI-O, but the CI cluster is stuck on OpenShift 3.11 and Docker at the moment.

Our SSH usecase is for gathering logs in the teardown container, but we've been using the tests image for both tests and teardown since b16dcfc (#22094).

@openshift-ci-robot openshift-ci-robot added the size/XS Denotes a PR that changes 0-9 lines, ignoring generated files. label Apr 17, 2019
This lets us SSH from the teardown container into the cluster without
hitting:

  $ ssh -A core@$bootstrap_ip
  No user exists for uid 1051910000

OpenSSH has a very early getpwuid call [1] with no provision for
bypassing via HOME or USER environment variables like we did for Bazel
[2].  OpenShift runs with the random UIDs by default [3]:

  By default, all containers that we try and launch within OpenShift,
  are set blocked from “RunAsAny” which basically means that they are
  not allowed to use a root user within the container.  This prevents
  root actions such as chown or chmod from being run and is a sensible
  security precaution as, should a user be able to perform a local
  exploit to break out of the container, then they would not be
  running as root on the underlying container host.  NB what about
  user-namespaces some of you are no doubt asking, these are
  definitely coming but the testing/hardening process is taking a
  while and whilst companies such as Red Hat are working hard in this
  space, there is still a way to go until they are ready for the
  mainstream.

while Kubernetes sorts out user namespacing [4].  Despite the high
UIDs, all users on the cluster are GID 0, so the g+w is sufficient
(vs. a+w), and maybe this mitigates concerns about increased
writability for such an important file.  The main mitigation is that
these are throw-away CI containers, and not long-running production
containers where we are concerned about malicious entry.

A more polished fix has landed in CRI-O [5], but the CI cluster is
stuck on OpenShift 3.11 and Docker at the moment.

Our SSH usecase is for gathering logs in the teardown container [6],
but we've been using the tests image for both tests and teardown since
b16dcfc (images/tests/Dockerfile*: Install gzip for compressing
logs, 2019-02-19, openshift#22094).

[1]: https://github.com/openssh/openssh-portable/blob/V_7_4_P1/ssh.c#L577
[2]: openshift/release#1185
[3]: https://blog.openshift.com/getting-any-docker-image-running-in-your-own-openshift-cluster/
[4]: kubernetes/enhancements#127
[5]: cri-o/cri-o#2022
[6]: openshift/release#3475
@sdodson
Copy link
Member

sdodson commented Apr 17, 2019

/lgtm

@openshift-ci-robot openshift-ci-robot added the lgtm Indicates that a PR is ready to be merged. label Apr 17, 2019
@openshift-ci-robot
Copy link

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: sdodson, wking

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci-robot openshift-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Apr 17, 2019
@abhinavdahiya
Copy link
Contributor

/retest

@abhinavdahiya
Copy link
Contributor

e2e-aws failed on flakes hopefully

Failing tests:

[Feature:Builds][Conformance] oc new-app  should succeed with a --name of 58 characters [Suite:openshift/conformance/parallel/minimal]
[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [Suite:openshift/conformance/parallel] [Suite:k8s]

/retest

@sdodson
Copy link
Member

sdodson commented Apr 18, 2019

/retest
GKE tests on AWS?

Failing tests:

[k8s.io] GKE local SSD [Feature:GKELocalSSD] should write and read from node local SSD [Feature:GKELocalSSD] [Suite:openshift/conformance/parallel] [Suite:k8s]

@openshift-merge-robot openshift-merge-robot merged commit 682485b into openshift:master Apr 18, 2019
@wking wking deleted the ssh-from-tests branch April 25, 2019 19:47
wking added a commit to wking/origin that referenced this pull request Feb 17, 2020
This reverts commit ca35cd6, openshift#22592.

As described in that commit message, the access was broadened to allow
ssh from containers launched from the tests image.  But since
openshift/release@7baa9f2e44 (ci-operator/templates/openshift: Remove
Terraform-state-based SSH gathers, 2020-01-25, openshift/release#6854)
landed, we no longer need to SSH from those containers.  Restore the
usual access restrictions to address CVE-2019-19347[1].

[1]: https://bugzilla.redhat.com/show_bug.cgi?id=1793287
tbuskey pushed a commit to tbuskey/origin that referenced this pull request Mar 19, 2020
This reverts commit ca35cd6, openshift#22592.

As described in that commit message, the access was broadened to allow
ssh from containers launched from the tests image.  But since
openshift/release@7baa9f2e44 (ci-operator/templates/openshift: Remove
Terraform-state-based SSH gathers, 2020-01-25, openshift/release#6854)
landed, we no longer need to SSH from those containers.  Restore the
usual access restrictions to address CVE-2019-19347[1].

[1]: https://bugzilla.redhat.com/show_bug.cgi?id=1793287
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. lgtm Indicates that a PR is ready to be merged. size/XS Denotes a PR that changes 0-9 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants