You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This isn't urgent or critical, IMO, but it's worth fixing:
I commented post-merge on #6218 but filing an issue since it's more likely to be seen:
In that PR, the calico-node service account is granted serviceaccount/token permission on itself. This allows calico-node to mint tokens for calico-node. This creates a potential security issue where if an attacker could steal a token they could then prevent their access from ever expiring by sending periodic TokenRequests for the same service account whose token they stole. Instead, it would be better to grant calico-node permission to request tokens for a separate service account that the CNI is intended to run as. For example, grant calico-node permission to mint tokens for a calico-node-cni service account, and grant calico-node-cni the permissions that the CNI needs. That way, no tokens have the ability to self-perpetuate.
Expected Behavior
Service account tokens should not be granted permission to self-perpetuate.
Current Behavior
calico-node service account is granted such permission.
This isn't urgent or critical, IMO, but it's worth fixing:
I commented post-merge on #6218 but filing an issue since it's more likely to be seen:
In that PR, the
calico-node
service account is grantedserviceaccount/token
permission on itself. This allowscalico-node
to mint tokens forcalico-node
. This creates a potential security issue where if an attacker could steal a token they could then prevent their access from ever expiring by sending periodic TokenRequests for the same service account whose token they stole. Instead, it would be better to grantcalico-node
permission to request tokens for a separate service account that the CNI is intended to run as. For example, grantcalico-node
permission to mint tokens for acalico-node-cni
service account, and grantcalico-node-cni
the permissions that the CNI needs. That way, no tokens have the ability to self-perpetuate.Expected Behavior
Service account tokens should not be granted permission to self-perpetuate.
Current Behavior
calico-node
service account is granted such permission.Possible Solution
Use a separate service account for the CNI.
@caseydavenport
The text was updated successfully, but these errors were encountered: