-
Notifications
You must be signed in to change notification settings - Fork 335
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix(*): localhost exposed application shouldn't be reachable #4750
Conversation
Signed-off-by: Łukasz Dziedziak <lukidzi@gmail.com>
Signed-off-by: Łukasz Dziedziak <lukidzi@gmail.com>
Signed-off-by: Łukasz Dziedziak <lukidzi@gmail.com>
Codecov Report
@@ Coverage Diff @@
## master #4750 +/- ##
=======================================
Coverage 46.45% 46.45%
=======================================
Files 690 690
Lines 47115 47164 +49
=======================================
+ Hits 21888 21912 +24
- Misses 23300 23322 +22
- Partials 1927 1930 +3
Help us with your feedback. Take ten seconds to tell us how you rate us. Have a feature suggestion? Share it here. |
Signed-off-by: Łukasz Dziedziak <lukidzi@gmail.com>
Signed-off-by: Łukasz Dziedziak <lukidzi@gmail.com>
Signed-off-by: Łukasz Dziedziak <lukidzi@gmail.com>
Signed-off-by: Łukasz Dziedziak <lukidzi@gmail.com>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Nice, thanks for the commits, much easier to review IMO
Signed-off-by: Łukasz Dziedziak <lukidzi@gmail.com>
@lukidzi what happens if application binds to |
@lukidzi - you need to pull master for the |
Signed-off-by: Łukasz Dziedziak <lukidzi@gmail.com>
It seems so, but it looks like it's the same behavior now. We've already had that rule so from iptables there is no change. |
Signed-off-by: Łukasz Dziedziak <lukidzi@gmail.com>
Signed-off-by: Łukasz Dziedziak <lukidzi@gmail.com>
Signed-off-by: Łukasz Dziedziak <lukidzi@gmail.com>
Signed-off-by: Łukasz Dziedziak <lukidzi@gmail.com>
Signed-off-by: Łukasz Dziedziak <lukidzi@gmail.com>
Signed-off-by: Łukasz Dziedziak <lukidzi@gmail.com>
Signed-off-by: Łukasz Dziedziak <lukidzi@gmail.com>
Summary
When a user deploys Kuma the behavior of communication with services changes.
When there is no Kuma and the application running within the pod is binding to PodIP or Wildcard(
0.0.0.0
) other pods are able to reach the application. After Kuma is deployed it's not possible anymore. Instead, applications that bind tolocalhost
or wildcard are exposed outside. That's a big security threat. In this PR we are introducing a different way how the inbound cluster is configured by default.Previously we had an inbound listener that had a static cluster that pointed to the address
localhost:PORT
. Now it's going to point toDataplaneIP
localhost
won't be accessible anymore.localhost
bydataplane.networking.inbound[].serviceAddress
What can I do to make the smooth upgrade?
localhost
and should be exposed outside - if no change to0.0.0.0
localhost
setdataplane.networking.inbound[].serviceAddress
to127.0.0.1
kuma-cp
configuration or env tokuma-cp
KUMA_DEFAULTS_ENABLE_LOCALHOST_INBOUND_CLUSTERS
- not recommended, we are going to remove this flag in the futureFull changelog
localhost
toDataplaneIP
]upstream_bind_address
for inbound clusters that don't set have localhost address]localhost
->inbound
]DataplaneIP
]UPGRADE.md
? --