Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

A series of feature requirements concerned with namespaces #2612

Closed
MagpieRYL opened this issue Jun 6, 2023 · 14 comments
Closed

A series of feature requirements concerned with namespaces #2612

MagpieRYL opened this issue Jun 6, 2023 · 14 comments

Comments

@MagpieRYL
Copy link

MagpieRYL commented Jun 6, 2023

Motivation

Intrusion detection in container-based cloud native environment may need observation on namespaces.
In our practise on container escaping detection, we are facing the demands:

  • detect namespace breaking through the setns syscall.
  • detect namespace breaking through ptrace into a process on host's namespace
  • but how could we know the namespace's change when it was breaking 👆 ?

Feature

  • parse the raw namespace value of the fd field of the setns syscall
  • parse namespace info of the target pid process in ptrace syscall: raw value and type, including (mnt, net, pid, ipc, cgroup, etc.)
  • parse the current-event-process's namespace: raw value and type, including (mnt, net, pid, ipc, cgroup, etc.)
  • parse the host's root namespace(like systemd's ns): raw value and type, including (mnt, net, pid, ipc, cgroup, etc.)

with these feature above, we can detect the namespace breaking (like utilizing setns/ptrace) by this feature: #2484

@Andreagit97
Copy link
Member

Same as #2613, this is an interesting feature and we will try to understand how much effort it will require! Thank you for sharing the knowledge!

@loresuso
Copy link
Member

loresuso commented Jun 9, 2023

Hello @MagpieRYL, thank you for this issue. I had a similar idea in the past, but I stopped trying to implement it because of the issue you mentioned above (that is, cannot use equality between two fields). Since the security use case is relevant, I really think we can try to understand how to implement this!

@Andreagit97 Andreagit97 added this to the TBD milestone Aug 31, 2023
@poiana
Copy link
Contributor

poiana commented Nov 29, 2023

Issues go stale after 90d of inactivity.

Mark the issue as fresh with /remove-lifecycle stale.

Stale issues rot after an additional 30d of inactivity and eventually close.

If this issue is safe to close now please do so with /close.

Provide feedback via https://github.com/falcosecurity/community.

/lifecycle stale

@Andreagit97
Copy link
Member

/remove-lifecycle stale

@poiana
Copy link
Contributor

poiana commented Feb 28, 2024

Issues go stale after 90d of inactivity.

Mark the issue as fresh with /remove-lifecycle stale.

Stale issues rot after an additional 30d of inactivity and eventually close.

If this issue is safe to close now please do so with /close.

Provide feedback via https://github.com/falcosecurity/community.

/lifecycle stale

@Andreagit97
Copy link
Member

/remove-lifecycle stale

@poiana
Copy link
Contributor

poiana commented May 28, 2024

Issues go stale after 90d of inactivity.

Mark the issue as fresh with /remove-lifecycle stale.

Stale issues rot after an additional 30d of inactivity and eventually close.

If this issue is safe to close now please do so with /close.

Provide feedback via https://github.com/falcosecurity/community.

/lifecycle stale

@Andreagit97
Copy link
Member

/remove-lifecycle stale

@poiana
Copy link
Contributor

poiana commented Aug 27, 2024

Issues go stale after 90d of inactivity.

Mark the issue as fresh with /remove-lifecycle stale.

Stale issues rot after an additional 30d of inactivity and eventually close.

If this issue is safe to close now please do so with /close.

Provide feedback via https://github.com/falcosecurity/community.

/lifecycle stale

@Andreagit97
Copy link
Member

/remove-lifecycle stale

@poiana
Copy link
Contributor

poiana commented Nov 26, 2024

Issues go stale after 90d of inactivity.

Mark the issue as fresh with /remove-lifecycle stale.

Stale issues rot after an additional 30d of inactivity and eventually close.

If this issue is safe to close now please do so with /close.

Provide feedback via https://github.com/falcosecurity/community.

/lifecycle stale

@poiana
Copy link
Contributor

poiana commented Dec 27, 2024

Stale issues rot after 30d of inactivity.

Mark the issue as fresh with /remove-lifecycle rotten.

Rotten issues close after an additional 30d of inactivity.

If this issue is safe to close now please do so with /close.

Provide feedback via https://github.com/falcosecurity/community.

/lifecycle rotten

@poiana
Copy link
Contributor

poiana commented Jan 26, 2025

Rotten issues close after 30d of inactivity.

Reopen the issue with /reopen.

Mark the issue as fresh with /remove-lifecycle rotten.

Provide feedback via https://github.com/falcosecurity/community.
/close

@poiana poiana closed this as completed Jan 26, 2025
@poiana
Copy link
Contributor

poiana commented Jan 26, 2025

@poiana: Closing this issue.

In response to this:

Rotten issues close after 30d of inactivity.

Reopen the issue with /reopen.

Mark the issue as fresh with /remove-lifecycle rotten.

Provide feedback via https://github.com/falcosecurity/community.
/close

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

4 participants