Kali Linux

Mesh-Kridik : An Open-Source Security Checker That Performs Security Checks On A Kubernetes Cluster

Mesh-Kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and outputs a security report

The security checks tests are the full implementation of istio security best practices

The security checks performed on a Kubernetes cluster with istio service mesh and is leveraged by OPA (Open Policy Agent) to enforce security rules, and the output audit report includes: the root cause of the security issue and proposed remediation for the security issue.

Requirements

  • Go 1.16+
  • jq
  • istio

Installation

git clone https://github.com/chen-keinan/mesh-kridik
cd mesh-kridik
make build

  • ote: mesh-kridik require root user to be executed

Quick Start

Execute Mesh-Kridik without any flags , execute all tests

./mesh-kridik

Execute mesh-kridik with flags , execute test on demand

Usage: mesh-kridik [–version] [–help] []
Available commands are:
-r , –report : run security checks and generate remediation report
-i , –include: execute only specific security check, example -i=1.1
-e , –exclude: ignore specific security check, example -e=1.1,2.0

Execute tests and generate failure tests report and it remediation’s

./mesh-kridik -r

Istio Security Checks

NameDescriptionImpact
Mutual TLSIstio Mutual TLS proxies are configured in permissive mode by defaultproxies will accept both mutual TLS and plaintext traffic
Istio Safer Authorization Policy PatternsUse ALLOW-with-positive-matching or DENY-with-negative-match patternsThese authorization policy patterns are safer because the worst result in the case of policy mismatch is an unexpected 403 rejection instead of an authorization policy bypass.
path normalization in authorization policyThe enforcement point for authorization policies is the Envoy proxy instead of the usual resource access point in the backend applicationA mismatch can lead to either unexpected rejection or a policy bypass
TLS origination for egress trafficUse of DestinationRule on service ServiceEntry for egress trafficNot using TLS origination for egress traffic to an external service will be send with plain/text
Protocol detectionexplicitly declare the service protocolmiss detection may result in unexpected traffic behavior
CNI supportistio transparent traffic capturenot al net traffic will not be capture
overly broad hostsavoid overly broad hosts settings in Gatewaymay cause potential exposure of unexpected domains
Restrict Gateway creation privilegesrestrict creation of Gateway resources to trusted cluster administratorsmay cause creation of gateway by untrusted users
Configure a limit on downstream connectionsUpdate global_downstream_max_connections in the config map according to the number of concurrent connections needed by individual gateway instances in your deployment. Once the limit is reached, Envoy will start rejecting tcp connectionsno limit on the number of downstream connections can cause exploited by a malicious actor
Configure third party service account tokensIt is recommended to configure 3rd party tokens Because the properties of the first party token are less securefirst party token properties are less secure and might cause authentication breach
Control PlaneIstiod exposes a few unauthenticated plaintext ports for convenience by defaultexposes the XDS service port 15010 and debug port 8080 over unauthenticated plaintext
Data PlaneThe proxy exposes a variety of portsThe applications running in the same pod as the proxy have access; there is no trust boundary between the sidecar and application
Understand traffic capture limitationsSecuring egress traffic by setting the meshConfig.outboundTrafficPolicy.modeexternal service access will not be controlled

User Plugin Usage (via go plugins)

The Kube-kridik expose a hook for user plugins Example :

  • MeshSecurityCheckResultHook – this hook accepts k8s service mesh security checks results

Compile user plugin

go build -buildmode=plugin -o=~//.so ~//.go

Copy plugin to folder (.kube-kridik folder is created on the 1st startup)

cp ~//.so ~/.kube-kridik/plugins/compile/.so

R K

Recent Posts

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

1 week ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

2 weeks ago

Red Team Certification – A Comprehensive Guide To Advancing In Cybersecurity Operations

Embark on the journey of becoming a certified Red Team professional with our definitive guide.…

3 weeks ago

CVE-2024-5836 / CVE-2024-6778 : Chromium Sandbox Escape via Extension Exploits

This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…

3 weeks ago

Rust BOFs – Unlocking New Potentials In Cobalt Strike

This took me like 4 days (+2 days for an update), but I got it…

3 weeks ago

MaLDAPtive – Pioneering LDAP SearchFilter Parsing And Security Framework

MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…

3 weeks ago