Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

The apiserver read-only API leaks bearer tokens #7963

Closed
stephenR opened this issue May 8, 2015 · 6 comments · Fixed by #8155
Closed

The apiserver read-only API leaks bearer tokens #7963

stephenR opened this issue May 8, 2015 · 6 comments · Fixed by #8155
Labels
area/security priority/backlog Higher priority than priority/awaiting-more-evidence.
Milestone

Comments

@stephenR
Copy link

stephenR commented May 8, 2015

From a minion:
curl http://kubernetes-master:7080/api/v1beta3/secrets
will return the bearer tokens for all service accounts.

I'm not sure if this is already taken care of as part of #5921.

@roberthbailey roberthbailey added priority/backlog Higher priority than priority/awaiting-more-evidence. area/security team/master labels May 8, 2015
@roberthbailey
Copy link
Contributor

The read-only port is only available within the cluster, which is currently assumed to be a secured, trusted network.

We are working on removing the read-only port from the apiserver (e.g. #5921) which should take care of this.

@lavalamp
Copy link
Member

The read-only port is going away in days; that should take care of this specific problem but not necessarily the general case.

@erictune the intention is to solve this with permissions?

@roberthbailey
Copy link
Contributor

At least that will mean that you need cluster admin access (read/write) to see the cluster secrets (right now anyone who can reach the read-only endpoint can escalate to having read-write access to the cluster). Until we have a permissions model in the master, I think that's the best we can do.

@goltermann goltermann modified the milestones: v1.0, v1.0-candidate May 12, 2015
@erictune
Copy link
Member

After #5921 is done, then we won't have anything called readonly. All
accounts (admin, default service account, etc) will be equally powerful.

Once we merge REST Policy, we will have differentiated permissions for
different roles.

On Tue, May 12, 2015 at 3:29 PM, Robert Bailey notifications@github.com
wrote:

At least that will mean that you need cluster admin access (read/write) to
see the cluster secrets (right now anyone who can reach the read-only
endpoint can escalate to having read-write access to the cluster). Until we
have a permissions model in the master, I think that's the best we can do.


Reply to this email directly or view it on GitHub
#7963 (comment)
.

@davidopp
Copy link
Member

davidopp commented Jun 1, 2015

@lavalamp can you update the status on this?

@lavalamp
Copy link
Member

lavalamp commented Jun 1, 2015

This will be fixed when #8155 merges.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/security priority/backlog Higher priority than priority/awaiting-more-evidence.
Projects
None yet
Development

Successfully merging a pull request may close this issue.

6 participants