Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

consider hardening the calico etcd service #255

Open
raesene opened this issue Apr 10, 2019 · 0 comments
Open

consider hardening the calico etcd service #255

raesene opened this issue Apr 10, 2019 · 0 comments

Comments

@raesene
Copy link

raesene commented Apr 10, 2019

Describe the solution you'd like
At the moment when you spin up a default instance of the quick start, it sets-up an instance of etcd to be used by Calico.

The configuration of etcd in use, allows for unauthenticated access from a remote host, which would allow anyone on the pod network or who could otherwise access the VPC, to read or change the data held in that datastore.

repo. steps

replace 172.31.43.124 with the master node IP address for your cluster

kubectl run -it test --image=raesene/alpine-containertools /bin/ash
export ETCDCTL_API=3
etcdctl --endpoints=172.31.43.124:6666 get / --prefix

recommendation

If possible, ensure that all communications to etcd require a valid client certificate.

Environment:

  • Kubernetes version: 1.13.2
  • OS ): Ubuntu 18.04.1
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant