Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

rules: add salt-call as a trusted process #2291

Merged
merged 2 commits into from
Nov 30, 2022
Merged

Conversation

vin01
Copy link
Contributor

@vin01 vin01 commented Nov 14, 2022

What type of PR is this?

/kind bug
/kind rule-update

Any specific area of the project related to this PR?

/area rules

What this PR does / why we need it:

salt-minion was added as a trusted process in 85f51cf and 1feae90, this however does not cover salt-call which is also a saltstack component and used on minions to apply changes from client-side. It should also be a trusted process along-with salt-minion as part of Saltstack.

Special notes for your reviewer:

Does this PR introduce a user-facing change?:

rule(Read sensitive file untrusted): let salt-call read sensitive files
rule(macro: rpm_procs): let salt-call write to rpm database

Thanks!

@poiana
Copy link
Contributor

poiana commented Nov 14, 2022

Welcome @vin01! It looks like this is your first PR to falcosecurity/falco 🎉

@poiana poiana added the size/XS label Nov 14, 2022
@vin01 vin01 changed the title rules: Add salt-call as a trusted process rules: add salt-call as a trusted process Nov 14, 2022
Signed-off-by: vin01 <vinc.i@protonmail.ch>
@darryk10
Copy link
Contributor

Hi @vin01 , thanks for contributing :)
I'm wondering if you are suggesting to add salt-call since you have seen some noise coming form it. If this is the case, can you share which kind of noise have you experienced?
thanks

@vin01
Copy link
Contributor Author

vin01 commented Nov 15, 2022

Hi @vin01 , thanks for contributing :) I'm wondering if you are suggesting to add salt-call since you have seen some noise coming form it. If this is the case, can you share which kind of noise have you experienced? thanks

Hi @darryk10, right. It was primarily Warning alerts as a result of attempts by salt-call to read files like /etc/shadow, /etc/sudo.* which is expected as salt is used to manage users, sudo rights using in-built modules. Typically I would just use a custom rule override but since salt-minion is trusted in this rule-set, I think it makes sense to have salt-call as well present in the same. salt-call is used on the client-side to apply states, while salt-minion is used when applying the same changes from Salt master itself.

Warning Sensitive file opened for reading by non-trusted program (user=root user_loginuid=-1 program=salt-call command=salt-call /usr/bin/salt-call state.apply ..

@jasondellaluce
Copy link
Contributor

/milestone 0.34.0

@poiana poiana added this to the 0.34.0 milestone Nov 15, 2022
@darryk10
Copy link
Contributor

Hi @vin01 thanks for the extra info and thanks to contributing to lower the noise :)
LGTM

Copy link
Contributor

@darryk10 darryk10 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@poiana
Copy link
Contributor

poiana commented Nov 16, 2022

LGTM label has been added.

Git tree hash: 402fc32a2d8fc5db8f2eeaff71f619984ec861b8

Copy link
Contributor

@jasondellaluce jasondellaluce left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/approve

@jasondellaluce
Copy link
Contributor

/retest

@jasondellaluce
Copy link
Contributor

closing and reopening to trigger the CI

/close

@poiana poiana closed this Nov 30, 2022
@poiana
Copy link
Contributor

poiana commented Nov 30, 2022

@jasondellaluce: Closed this PR.

In response to this:

closing and reopening to trigger the CI

/close

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@jasondellaluce
Copy link
Contributor

/reopen

@poiana poiana reopened this Nov 30, 2022
@poiana
Copy link
Contributor

poiana commented Nov 30, 2022

@jasondellaluce: Reopened this PR.

In response to this:

/reopen

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@poiana
Copy link
Contributor

poiana commented Nov 30, 2022

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: darryk10, jasondellaluce, leogr, vin01

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@poiana poiana merged commit 234026e into falcosecurity:master Nov 30, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
Archived in project
Development

Successfully merging this pull request may close these issues.

5 participants