[ 
https://issues.apache.org/jira/browse/MESOS-6953?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15838700#comment-15838700
 ] 

Vinod Kone commented on MESOS-6953:
-----------------------------------

Is this a short term solution? Why are you only protecting against the "run 
task" message from master? What about other messages like "kill task", 
"shutdown framework" etc that can come from a compromised master?

The right long term solution sounds like mutual authentication/authorization 
between master and agent.

> A compromised mesos-master node can execute code as root on agents.
> -------------------------------------------------------------------
>
>                 Key: MESOS-6953
>                 URL: https://issues.apache.org/jira/browse/MESOS-6953
>             Project: Mesos
>          Issue Type: Bug
>          Components: security
>            Reporter: Anindya Sinha
>            Assignee: Anindya Sinha
>              Labels: security, slave
>
> mesos-master has a `--[no-]root_submissions` flag that controls whether 
> frameworks with `root` user are admitted to the cluster.
> However, if a mesos-master node is compromised, it can attempt to schedule 
> tasks on agent as the `root` user. Since mesos-agent has no check against 
> tasks running on the agent for specific users, tasks can get run with `root` 
> privileges can get run within the container on the agent.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to