December 18, 2019

201 words 1 min read

CAP_NET_RAW and ARP Spoofing in Your Cluster: It's Going Downhill From Here

CAP_NET_RAW and ARP Spoofing in Your Cluster: It's Going Downhill From Here

Did you know that by default, your applications running in Kubernetes can open raw network sockets? This talk demonstrates how, in the right circumstances, the CAP_NET_RAW capability that allows this …

Talk Title CAP_NET_RAW and ARP Spoofing in Your Cluster: It's Going Downhill From Here
Speakers Liz Rice (Vice President, Open Source Engineering, Aqua Security)
Conference KubeCon + CloudNativeCon North America
Conf Tag
Location San Diego, CA, USA
Date Nov 15-21, 2019
URL Talk Page
Slides Talk Slides
Video

Did you know that by default, your applications running in Kubernetes can open raw network sockets? This talk demonstrates how, in the right circumstances, the CAP_NET_RAW capability that allows this can be abused by a compromised application.* ARP spoofing: pretending to represent the wrong IP address* If the app can ARP spoof the IP address of the DNS service, this potentially lets it spoof DNS addresses: pretending to represent the wrong domain nameSounds bad, doesn’t it?These attacks, and their consequences, will be demonstrated live, along with preventative measures that you can take to ensure they aren’t happening on your cluster.This talk explains CAP_NET_RAW and spoofing, but the audience is expected to be comfortable with Kubernetes concepts like pod specs and admission controllers.

comments powered by Disqus