Skip to content

Commit daec843

Browse files
ktKongTongwindsonseatengqmSea-n
authored
[zh-cn] translate security bypass risks (#37724)
Handle review comments Co-Authored-By: Michael <[email protected]> Co-Authored-By: Qiming Teng <[email protected]> Co-Authored-By: Sean <[email protected]> Co-authored-by: Michael <[email protected]> Co-authored-by: Qiming Teng <[email protected]> Co-authored-by: Sean <[email protected]>
1 parent da0aa2e commit daec843

File tree

1 file changed

+281
-0
lines changed

1 file changed

+281
-0
lines changed
Lines changed: 281 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,281 @@
1+
---
2+
title: Kubernetes API 服务器旁路风险
3+
description: >
4+
与 API 服务器及其他组件相关的安全架构信息
5+
content_type: concept
6+
weight: 90
7+
---
8+
9+
<!--
10+
title: Kubernetes API Server Bypass Risks
11+
description: >
12+
Security architecture information relating to the API server and other components
13+
content_type: concept
14+
weight: 90
15+
-->
16+
17+
<!-- overview -->
18+
<!--
19+
The Kubernetes API server is the main point of entry to a cluster for external parties
20+
(users and services) interacting with it.
21+
-->
22+
Kubernetes API 服务器是外部(用户和服务)与集群交互的主要入口。
23+
24+
<!--
25+
As part of this role, the API server has several key built-in security controls, such as
26+
audit logging and {{< glossary_tooltip text="admission controllers" term_id="admission-controller" >}}. However, there are ways to modify the configuration
27+
or content of the cluster that bypass these controls.
28+
-->
29+
作为此角色的一部分,API 服务器有几个关键的内置安全控制,
30+
例如审计日志和{{< glossary_tooltip text="准入控制器" term_id="admission-controller" >}}。
31+
但是,有一些方法可以绕过这些安全控制从而修改集群的配置或内容。
32+
33+
<!--
34+
This page describes the ways in which the security controls built into the
35+
Kubernetes API server can be bypassed, so that cluster operators
36+
and security architects can ensure that these bypasses are appropriately restricted.
37+
-->
38+
本页描述了绕过 Kubernetes API 服务器中内置安全控制的几种方式,
39+
以便集群运维人员和安全架构师可以确保这些绕过方式被适当地限制。
40+
41+
<!-- body -->
42+
<!--
43+
## Static Pods {#static-pods}
44+
-->
45+
## 静态 Pod {#static-pods}
46+
47+
<!--
48+
The {{< glossary_tooltip text="kubelet" term_id="kubelet" >}} on each node loads and
49+
directly manages any manifests that are stored in a named directory or fetched from
50+
a specific URL as [*static Pods*](/docs/tasks/configure-pod-container/static-pod) in
51+
your cluster. The API server doesn't manage these static Pods. An attacker with write
52+
access to this location could modify the configuration of static pods loaded from that
53+
source, or could introduce new static Pods.
54+
-->
55+
每个节点上的 {{< glossary_tooltip text="kubelet" term_id="kubelet" >}}
56+
会加载并直接管理集群中存储在指定目录中或从特定 URL
57+
获取的[**静态 Pod**](/zh-cn/docs/tasks/configure-pod-container/static-pod) 清单。
58+
API 服务器不管理这些静态 Pod。对该位置具有写入权限的攻击者可以修改从该位置加载的静态 Pod 的配置,或引入新的静态 Pod。
59+
60+
<!--
61+
Static Pods are restricted from accessing other objects in the Kubernetes API. For example,
62+
you can't configure a static Pod to mount a Secret from the cluster. However, these Pods can
63+
take other security sensitive actions, such as using `hostPath` mounts from the underlying
64+
node.
65+
-->
66+
静态 Pod 被限制访问 Kubernetes API 中的其他对象。例如,你不能将静态 Pod 配置为从集群挂载 Secret。
67+
但是,这些 Pod 可以执行其他安全敏感的操作,例如挂载来自下层节点的 `hostPath` 卷。
68+
69+
<!--
70+
By default, the kubelet creates a {{< glossary_tooltip text="mirror pod" term_id="mirror-pod">}}
71+
so that the static Pods are visible in the Kubernetes API. However, if the attacker uses an invalid
72+
namespace name when creating the Pod, it will not be visible in the Kubernetes API and can only
73+
be discovered by tooling that has access to the affected host(s).
74+
-->
75+
默认情况下,kubelet 会创建一个{{< glossary_tooltip text="镜像 Pod(Mirror Pod)" term_id="mirror-pod">}},
76+
以便静态 Pod 在 Kubernetes API 中可见。但是,如果攻击者在创建 Pod 时使用了无效的名字空间名称,
77+
则该 Pod 将在 Kubernetes API 中不可见,只能通过对受影响主机有访问权限的工具发现。
78+
79+
<!--
80+
If a static Pod fails admission control, the kubelet won't register the Pod with the
81+
API server. However, the Pod still runs on the node. For more information, refer to
82+
[kubeadm issue #1541](https://github.com/kubernetes/kubeadm/issues/1541#issuecomment-487331701).
83+
-->
84+
如果静态 Pod 无法通过准入控制,kubelet 不会将 Pod 注册到 API 服务器。但该 Pod 仍然在节点上运行。
85+
有关更多信息,请参阅 [kubeadm issue #1541](https://github.com/kubernetes/kubeadm/issues/1541#issuecomment-487331701)
86+
87+
<!--
88+
### Mitigations {#static-pods-mitigations}
89+
-->
90+
### 缓解措施 {#static-pods-mitigations}
91+
92+
<!--
93+
- Only [enable the kubelet static Pod manifest functionality](/docs/tasks/configure-pod-container/static-pod/#static-pod-creation)
94+
if required by the node.
95+
- If a node uses the static Pod functionality, restrict filesystem access to the static Pod manifest directory
96+
or URL to users who need the access.
97+
- Restrict access to kubelet configuration parameters and files to prevent an attacker setting
98+
a static Pod path or URL.
99+
- Regularly audit and centrally report all access to directories or web storage locations that host
100+
static Pod manifests and kubelet configuration files.
101+
-->
102+
- 仅在节点需要时[启用 kubelet 静态 Pod 清单功能](/zh-cn/docs/tasks/configure-pod-container/static-pod/#static-pod-creation)
103+
- 如果节点使用静态 Pod 功能,请将对静态 Pod 清单目录或 URL 的文件系统的访问权限限制为需要访问的用户。
104+
- 限制对 kubelet 配置参数和文件的访问,以防止攻击者设置静态 Pod 路径或 URL。
105+
- 定期审计并集中报告所有对托管静态 Pod 清单和 kubelet 配置文件的目录或 Web 存储位置的访问。
106+
107+
<!--
108+
## The kubelet API {#kubelet-api}
109+
-->
110+
## kubelet API {#kubelet-api}
111+
112+
<!--
113+
The kubelet provides an HTTP API that is typically exposed on TCP port 10250 on cluster
114+
worker nodes. The API might also be exposed on control plane nodes depending on the Kubernetes
115+
distribution in use. Direct access to the API allows for disclosure of information about
116+
the pods running on a node, the logs from those pods, and execution of commands in
117+
every container running on the node.
118+
-->
119+
kubelet 提供了一个 HTTP API,通常暴露在集群工作节点上的 TCP 端口 10250 上。
120+
在某些 Kubernetes 发行版中,API 也可能暴露在控制平面节点上。
121+
对 API 的直接访问允许公开有关运行在节点上的 Pod、这些 Pod 的日志以及在节点上运行的每个容器中执行命令的信息。
122+
123+
<!--
124+
When Kubernetes cluster users have RBAC access to `Node` object sub-resources, that access
125+
serves as authorization to interact with the kubelet API. The exact access depends on
126+
which sub-resource access has been granted, as detailed in [kubelet authorization](https://kubernetes.io/docs/reference/access-authn-authz/kubelet-authn-authz/#kubelet-authorization).
127+
-->
128+
当 Kubernetes 集群用户具有对 `Node` 对象子资源 RBAC 访问权限时,该访问权限可用作与 kubelet API 交互的授权。
129+
实际的访问权限取决于授予了哪些子资源访问权限,详见
130+
[kubelet 鉴权](/zh-cn/docs/reference/access-authn-authz/kubelet-authn-authz/#kubelet-authorization)
131+
132+
<!--
133+
Direct access to the kubelet API is not subject to admission control and is not logged
134+
by Kubernetes audit logging. An attacker with direct access to this API may be able to
135+
bypass controls that detect or prevent certain actions.
136+
-->
137+
对 kubelet API 的直接访问不受准入控制影响,也不会被 Kubernetes 审计日志记录。
138+
能直接访问此 API 的攻击者可能会绕过能检测或防止某些操作的控制机制。
139+
140+
<!--
141+
The kubelet API can be configured to authenticate requests in a number of ways.
142+
By default, the kubelet configuration allows anonymous access. Most Kubernetes providers
143+
change the default to use webhook and certificate authentication. This lets the control plane
144+
ensure that the caller is authorized to access the `nodes` API resource or sub-resources.
145+
The default anonymous access doesn't make this assertion with the control plane.
146+
-->
147+
kubelet API 可以配置为以多种方式验证请求。
148+
默认情况下,kubelet 的配置允许匿名访问。大多数 Kubernetes 提供商将默认值更改为使用 Webhook 和证书身份认证。
149+
这使得控制平面能够确保调用者访问 `Node` API 资源或子资源是经过授权的。但控制平面不能确保默认的匿名访问也是如此。
150+
151+
<!--
152+
### Mitigations
153+
-->
154+
### 缓解措施 {#mitigations}
155+
156+
<!--
157+
- Restrict access to sub-resources of the `nodes` API object using mechanisms such as
158+
[RBAC](/docs/reference/access-authn-authz/rbac/). Only grant this access when required,
159+
such as by monitoring services.
160+
- Restrict access to the kubelet port. Only allow specified and trusted IP address
161+
ranges to access the port.
162+
- [Ensure that kubelet authentication is set to webhook or certificate mode](/docs/reference/access-authn-authz/kubelet-authn-authz/#kubelet-authentication).
163+
- Ensure that the unauthenticated "read-only" Kubelet port is not enabled on the cluster.
164+
-->
165+
- 使用 [RBAC](/zh-cn/docs/reference/access-authn-authz/rbac/) 等机制限制对 `Node` API 对象的子资源的访问。
166+
只在有需要时才授予此访问权限,例如监控服务。
167+
- 限制对 kubelet 端口的访问。只允许指定和受信任的 IP 地址段访问该端口。
168+
- [确保将 kubelet 身份验证设置为 Webhook 或证书模式](/zh-cn/docs/reference/access-authn-authz/kubelet-authn-authz/#kubelet-authentication)
169+
- 确保集群上未启用不作身份认证的“只读” Kubelet 端口。
170+
171+
<!--
172+
## The etcd API
173+
-->
174+
## etcd API {#the-etcd-api}
175+
176+
<!--
177+
Kubernetes clusters use etcd as a datastore. The `etcd` service listens on TCP port 2379.
178+
The only clients that need access are the Kubernetes API server and any backup tooling
179+
that you use. Direct access to this API allows for disclosure or modification of any
180+
data held in the cluster.
181+
-->
182+
Kubernetes 集群使用 etcd 作为数据存储。`etcd` 服务监听 TCP 端口 2379。
183+
只有 Kubernetes API 服务器和你所使用的备份工具需要访问此存储。对该 API 的直接访问允许公开或修改集群中保存的数据。
184+
185+
<!--
186+
Access to the etcd API is typically managed by client certificate authentication.
187+
Any certificate issued by a certificate authority that etcd trusts allows full access
188+
to the data stored inside etcd.
189+
-->
190+
对 etcd API 的访问通常通过客户端证书身份认证来管理。
191+
由 etcd 信任的证书颁发机构所颁发的任何证书都可以完全访问 etcd 中存储的数据。
192+
193+
<!--
194+
Direct access to etcd is not subject to Kubernetes admission control and is not logged
195+
by Kubernetes audit logging. An attacker who has read access to the API server's
196+
etcd client certificate private key (or can create a new trusted client certificate) can gain
197+
cluster admin rights by accessing cluster secrets or modifying access rules. Even without
198+
elevating their Kubernetes RBAC privileges, an attacker who can modify etcd can retrieve any API object
199+
or create new workloads inside the cluster.
200+
-->
201+
对 etcd 的直接访问不受 Kubernetes 准入控制的影响,也不会被 Kubernetes 审计日志记录。
202+
具有对 API 服务器的 etcd 客户端证书私钥的读取访问权限(或可以创建一个新的受信任的客户端证书)
203+
的攻击者可以通过访问集群 Secret 或修改访问规则来获得集群管理员权限。
204+
即使不提升其 Kubernetes RBAC 权限,可以修改 etcd 的攻击者也可以在集群内检索所有 API 对象或创建新的工作负载。
205+
206+
207+
<!--
208+
Many Kubernetes providers configure
209+
etcd to use mutual TLS (both client and server verify each other's certificate for authentication).
210+
There is no widely accepted implementation of authorization for the etcd API, although
211+
the feature exists. Since there is no authorization model, any certificate
212+
with client access to etcd can be used to gain full access to etcd. Typically, etcd client certificates
213+
that are only used for health checking can also grant full read and write access.
214+
-->
215+
许多 Kubernetes 提供商配置 etcd 为使用双向 TLS(客户端和服务器都验证彼此的证书以进行身份验证)。
216+
尽管存在该特性,但目前还没有被广泛接受的 etcd API 鉴权实现。
217+
由于缺少鉴权模型,任何具有对 etcd 的客户端访问权限的证书都可以用于获得对 etcd 的完全访问权限。
218+
通常,仅用于健康检查的 etcd 客户端证书也可以授予完全读写访问权限。
219+
220+
<!--
221+
### Mitigations {#etcd-api-mitigations}
222+
-->
223+
### 缓解措施 {#etcd-api-mitigations}
224+
225+
<!--
226+
- Ensure that the certificate authority trusted by etcd is used only for the purposes of
227+
authentication to that service.
228+
- Control access to the private key for the etcd server certificate, and to the API server's
229+
client certificate and key.
230+
- Consider restricting access to the etcd port at a network level, to only allow access
231+
from specified and trusted IP address ranges.
232+
-->
233+
- 确保 etcd 所信任的证书颁发机构仅用于该服务的身份认证。
234+
- 控制对 etcd 服务器证书的私钥以及 API 服务器的客户端证书和密钥的访问。
235+
- 考虑在网络层面限制对 etcd 端口的访问,仅允许来自特定和受信任的 IP 地址段的访问。
236+
237+
<!--
238+
## Container runtime socket {#runtime-socket}
239+
-->
240+
## 容器运行时套接字 {#runtime-socket}
241+
242+
<!--
243+
On each node in a Kubernetes cluster, access to interact with containers is controlled
244+
by the container runtime (or runtimes, if you have configured more than one). Typically,
245+
the container runtime exposes a Unix socket that the kubelet can access. An attacker with
246+
access to this socket can launch new containers or interact with running containers.
247+
-->
248+
在 Kubernetes 集群中的每个节点上,与容器交互的访问都由容器运行时控制。
249+
通常,容器运行时会公开一个 kubelet 可以访问的 UNIX 套接字。
250+
具有此套接字访问权限的攻击者可以启动新容器或与正在运行的容器进行交互。
251+
252+
<!--
253+
At the cluster level, the impact of this access depends on whether the containers that
254+
run on the compromised node have access to Secrets or other confidential
255+
data that an attacker could use to escalate privileges to other worker nodes or to
256+
control plane components.
257+
-->
258+
在集群层面,这种访问造成的影响取决于在受威胁节点上运行的容器是否可以访问 Secret 或其他机密数据,
259+
攻击者可以使用这些机密数据将权限提升到其他工作节点或控制平面组件。
260+
261+
<!--
262+
### Mitigations {#runtime-socket-mitigations}
263+
-->
264+
### 缓解措施 {#runtime-socket-mitigations}
265+
266+
<!--
267+
- Ensure that you tightly control filesystem access to container runtime sockets.
268+
When possible, restrict this access to the `root` user.
269+
- Isolate the kubelet from other components running on the node, using
270+
mechanisms such as Linux kernel namespaces.
271+
- Ensure that you restrict or forbid the use of [`hostPath` mounts](/docs/concepts/storage/volumes/#hostpath)
272+
that include the container runtime socket, either directly or by mounting a parent
273+
directory. Also `hostPath` mounts must be set as read-only to mitigate risks
274+
of attackers bypassing directory restrictions.
275+
- Restrict user access to nodes, and especially restrict superuser access to nodes.
276+
-->
277+
- 确保严格控制对容器运行时套接字所在的文件系统访问。如果可能,限制为仅 `root` 用户可访问。
278+
- 使用 Linux 内核命名空间等机制将 kubelet 与节点上运行的其他组件隔离。
279+
- 确保限制或禁止使用包含容器运行时套接字的 [`hostPath` 挂载](/zh-cn/docs/concepts/storage/volumes/#hostpath)
280+
无论是直接挂载还是通过挂载父目录挂载。此外,`hostPath` 挂载必须设置为只读,以降低攻击者绕过目录限制的风险。
281+
- 限制用户对节点的访问,特别是限制超级用户对节点的访问。

0 commit comments

Comments
 (0)