Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Handling Containers that runAsRoot #293

Open
3 tasks
andrewg-xyz opened this issue Oct 11, 2024 · 3 comments
Open
3 tasks

Handling Containers that runAsRoot #293

andrewg-xyz opened this issue Oct 11, 2024 · 3 comments

Comments

@andrewg-xyz
Copy link
Contributor

There is software (and containers) that seem to require running as root (tip: you shouldn't) We will proactively encourage upstream to avoid this bad practice Ex. confluent#364).

Do we actively prohibit containers running as root?

Tasks

Preview Give feedback

(summary of offline discussion)

Summary of Discussion on Root Containers in Kubernetes

The team engaged in a conversation regarding the challenges and risks of running containers as root in Kubernetes, prompted by @corang's concern about packages requiring root.

  • Initial Concern: @corang pointed out the difficulty of avoiding root containers, asking if running as root is a show-stopper for apps in the appstore.

  • General Consensus:

    • @docandrew and @TheFutonEng mentioned that their apps currently require root due to specific functionalities (e.g., capturing traffic or running web servers), but they hoped root containers would be discouraged, not forbidden.
    • @andrewg-xyz clarified that the team should discourage root containers and address them case-by-case. While not illegal, root containers should be mitigated or limited whenever possible, especially for security purposes.
  • Security Risk Discussion:

    • @corang expressed that running root containers in Kubernetes poses a significant security risk. @TheFutonEng shared a scenario where avoiding root would require substantial upstream contributions, delaying project timelines.
    • @andrewg-xyz emphasized that while root containers are highly discouraged, exceptions can be made depending on the context and mitigations.
  • Mitigation Suggestions:

  • Conclusion: The discussion indicated a need to balance security with functionality, using mitigations like user namespaces or separate clusters. The topic of root containers might influence badging levels in the appstore, with stricter rules (e.g., Gold or Silver level) being considered for apps running root containers. Further input was requested from experts like @bburky and @tomclapper to refine the team's stance on the matter.

@corang
Copy link
Contributor

corang commented Oct 11, 2024

I think I'm on team "Must be non-root for silver where intrinsic application functionality doesn't require it"

@corang
Copy link
Contributor

corang commented Oct 11, 2024

I'd also like to say that any containers running as root or root-ish need to have justifications/explanations, even at bronze.

@zachariahmiller
Copy link
Contributor

zachariahmiller commented Oct 11, 2024

Completely agree with @corang on this regarding his two comments.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants