Dominik Pataky Faculty of Computer Science, Institute of Systems Architecture, Chair of Computer Networks
Tencrypt: Encrypting Tenant-Traffic in OpenShift
Forschungsprojekt Anwendung // Dresden, 15th November, 2018
Tencrypt: Encrypting Tenant-Traffic in OpenShift Forschungsprojekt - - PowerPoint PPT Presentation
Dominik Pataky Faculty of Computer Science, Institute of Systems Architecture, Chair of Computer Networks Tencrypt: Encrypting Tenant-Traffic in OpenShift Forschungsprojekt Anwendung // Dresden, 15th November, 2018 Contents Introduction Red
Dominik Pataky Faculty of Computer Science, Institute of Systems Architecture, Chair of Computer Networks
Forschungsprojekt Anwendung // Dresden, 15th November, 2018
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 2/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 3/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 4/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 4/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 4/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 4/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 5/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 5/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 5/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 5/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 5/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 5/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 5/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 5/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 6/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 7/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 7/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 7/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 7/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 8/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 8/32
Related tools Related technologies
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 8/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 9/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 9/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 9/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 9/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 9/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 9/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 9/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 10/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 10/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 10/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 10/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 10/32
eth0 vethA br0 vxlan0 tun0 vethB
Internet
Figure 1: Overview of networking of Nodes, Pods and Containers
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 11/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 12/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 12/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 12/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 12/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 12/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 13/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 14/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 14/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 14/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 14/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 14/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 14/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 14/32
ID Description Mitigation T1 An attacker uses a Pod to intercept traffic originating from other namespaces (Pods) on the br0 bridge. Encryption of traffic, hardening of isol- ation mechanisms (Linux kernel). T2 An attacker not only intercepts, but is able to modify traffic on the br0 bridge or the vxlan0 adapter. Encryption and integrity checks. T3 Interception and modification of Master-to-Node traffic. IPsec. T4 Interception of Node-to-Node traffic, both Project- internal and cross-Project. A combination of Node-to-Node IPsec and Tencrypt for Project-internal traffic T5 Incoming external Service traffic is intercepted (and maybe modified) before it reaches the handling Service namespace. OKD Secured routes. T6 The Pod image used by OpenShift to deploy new Pods, is maliciously modified. Securing the image registry. The registry depends on the used container techno- logy and might be an external compon- ent. T7 Resources requested by a Pod limit the availability of
Continuous resource monitoring, mi- gration or halting of resource intensive Pods if needed.
Note about containerisation
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 16/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 17/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 17/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 17/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 17/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 18/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 18/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 18/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 19/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 19/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 19/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 19/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 19/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 19/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 20/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 20/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 20/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 20/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 20/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 20/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 21/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 21/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 21/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 21/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 21/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 21/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 21/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 21/32
Networking pitfalls
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 21/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 22/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 22/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 22/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 22/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 22/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 22/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 23/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 23/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 23/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 23/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 23/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 23/32
default route for Services IPs binds to eth0
reads Figure 2: Overview of the proxy application implementation schema
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 24/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 25/32
Figure 3: Traffic flow part one, DNS proxy
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 26/32
Figure 4: Traffic flow part two, client issues a request to a Service
Figure 5: Traffic flow part three, Service replies to request
Figure 6: Results of iperf measurements with different amounts of clients. Taken with iperf inside the Minishift VM (Virtualbox, 2 CPUs, 2GB RAM).
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 29/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 30/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 31/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 31/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 31/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 31/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 31/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 31/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 31/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 31/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 32/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 33/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 34/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 34/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 34/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 34/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 35/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 35/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 35/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 35/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 35/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 36/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 36/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 36/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 36/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 36/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 37/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 37/32
Tencrypt: Encrypting Tenant-Traffic in OpenShift Chair of Computer Networks // Dominik Pataky Dresden, 15th November, 2018 37/32