-
Notifications
You must be signed in to change notification settings - Fork 3.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Investigate disabling unnecessary services on hosted runner #4867
Comments
Hey, @varunsh-coder |
@varunsh-coder , I have created a #4873 PR to disable motd network activity. It's definitely not a security issue, because those services pre-installed and enabled by default. |
Thanks @al-cheb for the PR! I see that Is I agree it is not an immediate security issue, but it is a best practice to disable services that are not needed, to reduce attack surface. CC: @maxim-lobanov since you had opened an issue earlier to harden the hosted runner, you might want to weigh in on this issue. |
@varunsh-coder, I have added a command to mask the |
These proposals make sense to me! |
Hi @al-cheb please let me know if you want me to create a separate issue for this. The GitHub-hosted Ubuntu VM also makes calls to |
@varunsh-coder, Thank you. No need to create a separate issue. I will check. |
@varunsh-coder please ignore this spammy user @freddy123098 |
@varunsh-coder , The new images with disabled motd updates have been deployed. We also have disabled snap auto refresher in scope of this #4768 PR. Looks like it's not enough to disable all calls to |
Thanks a lot @al-cheb! I am curious why disabling |
It appears there are still/now active outbounds calls to |
Description
step-security/harden-runner is a GitHub Action that correlates and blocks outbound traffic from GitHub workflows. In some workflows, traffic to
cdn.fwupd.org
was observed which was not from the workflow itself. As an example, in this workflow run, traffic tocdn.fwupd.org
was detected and blocked.This call is made by fwupdmgr. This is a system daemon to allow session software to update firmware. I believe this is not really used, and just increases attack surface.
Similarly, in some workflows, traffic to
motd.ubuntu.com
is observed. This is to fetchmessage of the day
.Please investigate disabling/ removing unnecessary services on hosted runners, to reduce attack surface and risk of software supply chain security issues.
Virtual environments affected
Image version and build link
https://github.com/nvm-sh/nvm/actions/runs/1614399726
https://github.com/harden-runner-canary/kyverno/actions/runs/1685857420
Is it regression?
No response
Expected behavior
There should be no unexpected outbound calls from unnecessary services on hosted runner.
Actual behavior
In some workflows, outbound calls are made to
cdn.fwupd.org
andmotd.ubuntu.com
that are not expected.Repro steps
You can use https://github.com/step-security/harden-runner to correlate and block traffic on ubuntu hosted runner. The unexpected outbound calls from unnecessary services are not made on every run, so cannot be reproed every time, but can be seen off and on.
The text was updated successfully, but these errors were encountered: