Security Considerations on Istio's CRDs with Namespace-based Multi-Tenancy#17244
Security Considerations on Istio's CRDs with Namespace-based Multi-Tenancy#17244lorinl wants to merge 18 commits intoistio:masterfrom
Conversation
…k scenario in which a `VirtualService` can redirect or intercept traffic within the service mesh. Co-authored-by: Sven Nobis <mail@sven.to>
|
😊 Welcome! This is either your first contribution to the Istio documentation repo, or
Thanks for contributing! Courtesy of your friendly welcome wagon. |
|
Hi @lorinl. Thanks for your PR. I'm waiting for a istio member to verify that this patch is reasonable to test. If it is, they should reply with Regular contributors should join the org to skip this step. Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
…k scenario in which a `VirtualService` can redirect or intercept traffic within the service mesh. Fixed typo Co-authored-by: Sven Nobis <mail@sven.to>
|
/ok-to-test |
…k scenario in which a `VirtualService` can redirect or intercept traffic within the service mesh. Fixed typo Co-authored-by: Sven Nobis <mail@sven.to>
…k scenario in which a `VirtualService` can redirect or intercept traffic within the service mesh. Fixed linter errors Co-authored-by: Sven Nobis <mail@sven.to>
keithmattix
left a comment
There was a problem hiding this comment.
Added some comments on specific technical details. From a tone perspective, it's important that we don't imply that these resources are inherently insecure. Rather, they are products of their time and have tradeoffs that users need to scrutinize when trying to use them in multi-tenant environments. As I describe in one of the comments, the key takeaway that those users should get from this article is that they should move to using Gateway API
content/en/blog/2026/security-considerations-on-namespace-based-multi-tenancy/index.md
Show resolved
Hide resolved
content/en/blog/2026/security-considerations-on-namespace-based-multi-tenancy/index.md
Outdated
Show resolved
Hide resolved
content/en/blog/2026/security-considerations-on-namespace-based-multi-tenancy/index.md
Outdated
Show resolved
Hide resolved
content/en/blog/2026/security-considerations-on-namespace-based-multi-tenancy/index.md
Outdated
Show resolved
Hide resolved
content/en/blog/2026/security-considerations-on-namespace-based-multi-tenancy/index.md
Outdated
Show resolved
Hide resolved
…k scenario in which a VirtualService can redirect or intercept traffic within the service mesh. This commit addresses the requested changes in the pull request. Co-authored-by: Lorin <lhwny.hd@gmail.com>
|
Hi @keithmattix, In the mitigation section, we emphasize the migration to the Gateway API now. Also, it should be clearer that the discussed problems affect only namespace-based multi-tenant environments, and it should emphasize to operators that they should address them. We don’t want to imply that the resources are inherently insecure in our post. |
…k scenario in which a VirtualService can redirect or intercept traffic within the service mesh. Updated publish date. Co-authored-by: Lorin <lhwny.hd@gmail.com>
…k scenario in which a VirtualService can redirect or intercept traffic within the service mesh. Fixed linter errors. Co-authored-by: Lorin <lhwny.hd@gmail.com>
content/en/blog/2026/security-considerations-on-namespace-based-multi-tenancy/index.md
Outdated
Show resolved
Hide resolved
content/en/blog/2026/security-considerations-on-namespace-based-multi-tenancy/index.md
Show resolved
Hide resolved
content/en/blog/2026/security-considerations-on-namespace-based-multi-tenancy/index.md
Outdated
Show resolved
Hide resolved
content/en/blog/2026/security-considerations-on-namespace-based-multi-tenancy/index.md
Show resolved
Hide resolved
content/en/blog/2026/security-considerations-on-namespace-based-multi-tenancy/index.md
Outdated
Show resolved
Hide resolved
content/en/blog/2026/security-considerations-on-namespace-based-multi-tenancy/index.md
Outdated
Show resolved
Hide resolved
content/en/blog/2026/security-considerations-on-namespace-based-multi-tenancy/index.md
Outdated
Show resolved
Hide resolved
content/en/blog/2026/security-considerations-on-namespace-based-multi-tenancy/index.md
Show resolved
Hide resolved
…k scenario in which a VirtualService can redirect or intercept traffic within the service mesh. Consistency in style. Co-authored-by: Lorin <lhwny.hd@gmail.com>
…d-multi-tenancy/index.md Co-authored-by: Keith Mattix II <keithmattix2@gmail.com>
content/en/blog/2026/security-considerations-on-namespace-based-multi-tenancy/index.md
Outdated
Show resolved
Hide resolved
PR: Address a security issue of a possible Man-in-the-Middle (MitM) attack scenario in which a VirtualService can redirect or intercept traffic within the service mesh. Co-authored-by: Lorin <lhwny.hd@gmail.com>
PR: Address a security issue of a possible Man-in-the-Middle (MitM) attack scenario in which a VirtualService can redirect or intercept traffic within the service mesh. Co-authored-by: Lorin <lhwny.hd@gmail.com>
PR: Address a security issue of a possible Man-in-the-Middle (MitM) attack scenario in which a VirtualService can redirect or intercept traffic within the service mesh. Co-authored-by: Lorin <lhwny.hd@gmail.com>
PR: Address a security issue of a possible Man-in-the-Middle (MitM) attack scenario in which a VirtualService can redirect or intercept traffic within the service mesh. Co-authored-by: Lorin <lhwny.hd@gmail.com>
PR: Address a security issue of a possible Man-in-the-Middle (MitM) attack scenario in which a VirtualService can redirect or intercept traffic within the service mesh. Co-authored-by: Lorin <lhwny.hd@gmail.com>
PR: Address a security issue of a possible Man-in-the-Middle (MitM) attack scenario in which a VirtualService can redirect or intercept traffic within the service mesh. Co-authored-by: Lorin <lhwny.hd@gmail.com>
Description
This pull request addresses a security issue of a possible Man-in-the-Middle (MitM) attack scenario in which a
VirtualServicecan redirect or intercept traffic within the service mesh. This affects Namespace-based Multi-Tenancy clusters where tenants have the permissions to deploy Istio resources (networking.istio.io/v1).As discussed with @keithmattix and @dhawton through the security vulnerability report list, we address it by raising awareness on the topic through:
Please note, we did not include the part "If a user wants to change the scope of where these resources are applied, they can use the exportTo field on each resource to control which namespaces the resource affects or deploy a Sidecar resource to control which namespaces a particular set of sidecars import configuration from." from our discussion as attackers wouldn't limit themselfes.
Reviewers
CC: @SvenTo