Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[nomad-1.5] Nomad API socket exposed by default leading to a larger attack surface. #16436

Open
apollo13 opened this issue Mar 11, 2023 · 1 comment

Comments

@apollo13
Copy link
Contributor

Like mentioned in #15864 (comment) exposing the API socket to tasks by default increases the attack surface for malicious actors. Especially for operators not needing the API socket, it would be great to be able to disable it (truth to be told it should be disabled by default).

In an ideal world I think we might wanna have the following:

  • A toggle in the jobspec to activate the socket for a task.
  • Add a nomad_api = true|false to namespace apply like we do for task drivers (https://developer.hashicorp.com/nomad/docs/commands/namespace/apply)
  • Maybe even at a flag to the client config to disallow it for certain clients; not sure how much that would offer since I assume operators (ie those who can create and configure the namespaces) need to be trustworthy anyways
@jrasell
Copy link
Member

jrasell commented Mar 20, 2023

Hi @apollo13 and thanks for raising this issue and I appreciate the detail around control possibilities. This is something we probably need to discuss a little more to come up with a solution with an ideal UX, but I certainly think it's a good idea.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
Status: Needs Roadmapping
Development

No branches or pull requests

2 participants