-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
security: SSH HostKeyCallback / ssh.InsecureIgnoreHostKey #4352
Comments
@philpennock Appreciate you keeping us honest, any recommendation for handling ssh securely? We need it to be programmatic without human interaction. /assign @justinsb |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
I apologize for not answering re the request for recommendations. Really, it depends upon what the bare metal provisioning does and whether or not, and how, you capture console logs. The documentation on baremetal is not surfacing with some searches, so it's not clear if this is a mode of "someone ran stuff on a new box via a USB stick and we have no choices" or "TPM is required and there's a service a box can post a TPM-managed-key signed statement to" or anything else. The kubernetes/enhancements#360 feature is missing a link to a design doc. Ultimately, this needs to be thought about, documented, and if there has to be a mode of "we have nothing to verify" then a flag /remove-lifecycle stale |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
This isn't in a release, and we'll probably tackle it as part of the machines api / cluster api. But it's definitely still an open issue. /remove-lifecycle rotten |
Sorry, by not in a release I mean that it shouldn't be part of anyone's workflow. I'm sure the code is present in our released binaries. |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Rotten issues close after 30d of inactivity. Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
@fejta-bot: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
kops
version are you running? The commandkops version
, will displaythis information.
Code examination of HEAD.
N/A
N/A
fgrep -r InsecureIgnoreHostKey kops
I got a match and investigated to confirm that it was not a test-case, but code intended for production.
No matches.
N/A
PR #4193 added
kops toolbox bundle
, which is an initial implementation not yet in a release AFAICS. Code review did not highlight the introduction of the line:To be clear: this is outright rejecting any kind of hostkey verification, with no warning, no prompting, or anything else. Enrolling a bare-metal machine is therefore subject to unwarned man-in-the-middle attack. It would be awesome to not regress like this.
The text was updated successfully, but these errors were encountered: