[ 
https://issues.apache.org/jira/browse/MESOS-6953?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15836937#comment-15836937
 ] 

Adam B commented on MESOS-6953:
-------------------------------

cc: [~arojas]
Interesting.. So you use the framework principal as the "subject", although 
it's the master that's actually making the request?
So, now, if a framework wants to run a task, it must have permission not just 
on the masters, but also on every agent (where it might want to run)? What if 
it has the ACL on some agents, but not others? How would it discover that, by 
trial and error?
What's the live upgrade story here? Operators must copy the run_tasks ACL from 
the masters to all agents (and restart the agents)?

> A compromised mesos-master node can execute code as root on agents.
> -------------------------------------------------------------------
>
>                 Key: MESOS-6953
>                 URL: https://issues.apache.org/jira/browse/MESOS-6953
>             Project: Mesos
>          Issue Type: Bug
>          Components: security
>            Reporter: Anindya Sinha
>            Assignee: Anindya Sinha
>              Labels: security, slave
>
> mesos-master has a `--[no-]root_submissions` flag that controls whether 
> frameworks with `root` user are admitted to the cluster.
> However, if a mesos-master node is compromised, it can attempt to schedule 
> tasks on agent as the `root` user. Since mesos-agent has no check against 
> tasks running on the agent for specific users, tasks can get run with `root` 
> privileges can get run within the container on the agent.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to