SlideShare una empresa de Scribd logo
1 de 40
Secure Container:
Kata Container & gVisor
Speaker: Mango
1
Nice to meet you
My name is Ching-Hsuan Yen, and Mango as a nickname.
- A R&D engineer in Deep Security of Trend Micro
- A CS master of NCTU
- A former leader of Linux team in NCTU CSCC
- A member of Bamboofox
2
Outline
Kubernetes: Secure Container Isolation
- Requirements and use cases
Are containers secure?
- The weakness of containers
Approaches to secure containers
- Kata Container and gVisor
3
Kubernetes: Secure Container Isolation
4
https://goo.gl/eQHuqo
Requirements: CIA
Confidentiality - a sandboxed process should not be able to access:
● application data in other pods - e.g. volumes, memory, writeable layer, etc.
● application metadata of other pods - e.g. container image names, pod & service names, pod labels,
etc.
● system metrics & resource usage
● system metadata - e.g. kubernetes version, os version, runtime version
Integrity - a sandboxed process should not be able to alter:
● processes or data outside the sandbox, e.g. mitigate confused deputy attacks, data tampering, etc.
● perform operations not required by the sandboxed application, e.g. a web server may not need to
make outgoing connections
Availability - a sandboxed process should not be able to affect the availability of processes or resources
outside the sandbox, e.g. mitigate local DoS attacks
5
Use cases
1. Sandbox vulnerable code (media library model)
2. Sandbox untrusted code (vendor blackbox model)
3. Provide maximum defense in depth (financial services model)
4. Sandbox multitenant code (hosting provider model)
5. Sandbox multitenant services
6. Mutually untrusted users want to share a cluster (KaaS model)
7. Sidecar container has distinct privileges
6
Use cases
1. Sandbox vulnerable code (media library model)
2. Sandbox untrusted code (vendor blackbox model)
3. Provide maximum defense in depth (financial services model)
4. Sandbox multitenant code (hosting provider model)
5. Sandbox multitenant services
6. Mutually untrusted users want to share a cluster (KaaS model)
7. Sidecar container has distinct privileges
7
Use cases
1. Sandbox vulnerable code (media library model)
2. Sandbox untrusted code (vendor blackbox model)
3. Provide maximum defense in depth (financial services model)
4. Sandbox multitenant code (hosting provider model)
5. Sandbox multitenant services
6. Mutually untrusted users want to share a cluster (KaaS model)
7. Sidecar container has distinct privileges
8
Use cases
1. Sandbox vulnerable code (media library model)
2. Sandbox untrusted code (vendor blackbox model)
3. Provide maximum defense in depth (financial services model)
4. Sandbox multitenant code (hosting provider model)
5. Sandbox multitenant services
6. Mutually untrusted users want to share a cluster (KaaS model)
7. Sidecar container has distinct privileges
9
Use cases
1. Sandbox vulnerable code (media library model)
2. Sandbox untrusted code (vendor blackbox model)
3. Provide maximum defense in depth (financial services model)
4. Sandbox multitenant code (hosting provider model)
5. Sandbox multitenant services
6. Mutually untrusted users want to share a cluster (KaaS model)
7. Sidecar container has distinct privileges
10
Use cases
11
Current State of Container Isolation
Namespaces - Isolate kernel data structures, such as processes, mount tables, network interfaces, and others. Not all kernel data
structures have namespace isolation, such as the clock, audit logs, and keyrings.
cgroups - Limits, controls, and accounting of compute resources and devices. Examples include limiting and accounting CPU,
memory and network usage, hiding devices, and limiting the number of process IDs.
seccomp-bpf - Whitelist (filter) linux syscalls & arguments. Useful for restricting non-namespaced syscalls, poorly supported syscalls,
and syscalls that don't have associated capabilities. Docker provides a default seccomp profile, which is compatible with most
unprivileged container workloads.
AppArmor / SELinux - A Linux Security Module (AppArmor & SELinux are mutually exclusive). Mostly useful for finer grained control
of filesystem access, but recent changes are adding in more networking controls.
Users - Core linux permission model. Mostly used for filesystem permissions (DAC) and process signaling.
Capabilities - Subdivide root user privileges into various capabilities. The docker defaults drop un-namespaced capabilities (e.g. ability
to install kernel modules, manage the network devices, and reboot the machine).
12
Attack Surface
1. Kernel
2. Daemon
3. Network
4. Storage
5. Hardware
13
Are containers secure?
14
Are containers secure?
Is it secure that downloads random container images and run it on the host.
Is it secure that CaaS providers allow tenants run their own images?
Is it possible that containers are secure as VMs?
15
Are containers secure?
Containers should be treated as a standard services e.g. nginx, postfix, sshd.
As an experienced system administrator, you should:
● Drop privileges as quickly as possible
● Run your services as non-root whenever possible
● Treat root within a container as if it is root outside of the container
16
Normal containers are not secure
Privileged container: too dangerous
Unprivileged container: no root no life
Namespaced container: sound good ?
Kernel
Container
Vulner
17
Normal containers are not secure
Privileged container: too dangerous
Unprivileged container: no root no life
Namespaced container: sound good ?
NO, not everything is namespaced.
Containers are still vulnerable.Kernel
Container
Vulner
18
Normal containers are not secure
Major kernel subsystems are not namespaced like:
1. SELinux
2. Cgroups
3. file systems under /sys
4. /proc/sys, /proc/sysrq-trigger, /proc/irq, /proc/bus
Devices are not namespaced:
1. /dev/mem
2. /dev/sd* file system devices
3. Kernel Modules
Just try to break one of them, you can own the system,
e.g. Dirty COW.
Kernel
Container
Vulner
19
Approaches to secure containers
20
How to protect the host kernel?
Keep containers out of the kernel space.
But how could container work without the host kernel?
21
How to protect the host kernel?
Keep containers out of the kernel space.
But how could container work without the host kernel?
Just forge one to containers!
22
Two ideas
gVisor: we can forge a kernel!
I means… a kernel in User Space!
Kata Container: we can forge a kernel!
I means… a kernel in Virtual Machines!
23
Two ideas
gVisor: we can forge a kernel!
I means… a kernel in User Space!
Kata Container: we can forge a kernel!
I means… a kernel in Virtual Machines!
24
Isolation
Kata Container gVisor
25
Containerd
Kata Container
Shim
Kata Shim Kata Runtime
Hypervisor (QEMU/KVM)
Guest Kernel
Kata Agent
Pod / Container namespace
Container /
Application
Container /
Application
OCI Platform
VSOCK
gRPC
26
OCI Platform
gVisor
Shim
Sentry
which acts as a VM
and a kernel
Ptrace
Container /
Appliaction
Gofer
a proxy to file systems
9p
runsc
27
Container /
Appliaction
Sentry
which acts as a
kernel
KVM
OCI Platform
gVisor: KVM (experimental)
Shim
Sentry
which acts as a VM
runsc
Intel VT
AMD-V
VM Entry
VM Exit
28
Boot time
Kata Container: 800ms
gVisor: 150ms
Docker runc: 140ms
Kata Container Booting Process
docker run
VM boot Kernel Agent
Start
Container
Prepare
Image
Prepare
Volumes
Create Start
Hot plug
29
Memory footprint
gVisor merely consumes memory as much as its runtime size.
However, memory footprint is a big issue to virtual machines.
Kata Container uses such approaches:
● Minimal rootfs
● Minimal kernel
● VM Template
● DAX/nvdimm
● Kernel Samepage Merging (KSM)
30
Host
VM
Host
VM
DAX/nvdimm
Rootfs
Shared
memory
nvdimm
DAX
Rootfs
Block device
driver
virtio-blk
ext4
VM with block device VM with DAX/nvdimm
Page
cache!
Map into
shared
memory
Page
cache!
31
Kernel Samepage Merging
Initial state
Aggressive
Standard
Slow
No trigger(30s)
No trigger(2min)
No trigger(30s)
New trigger
Trigger
Kata Container uses KSM to merge
same memory pages of kernels
between VMs.
KSM is triggered when creating a
container of Kata Container.
Thus, each kernel between VMs
would share the same memory
pages.
32
VM Network Namespace
Container Network
Namespace
Networking: Kata Container
Bridge MacVTap
VM
Tap
Pod
Container
ContainerVeth
33
Sentry
Networking: gVisor
Container Network
Namespace
Bridge
Container
Veth NetStack
gVisor Network Namespace
34
Performance
Byte Unix Benchmark & Phoronix Test Suite v7.8.0
35
Current status
Kata Container has released its first version, which supports OCI platform like
docker or kubernetes, and works fine on ARM and x86 architectures.
gVisor is still in early development and doesn’t yet support some system call
which make it unstable.
Even that, some applications have been executable on it e.g. httpd, golang,
mongo db, but many others are not e.g. nginx, elasticsearch.
36
How to use
Kata-container has deb/rpm packages on x86_64 platform.
gVisor has nightly builds. https://storage.googleapis.com/gvisor/releases/nightly/latest/runsc
Enable nested-virtualization:
$ kata-runtime kata-check
Docker version > 17.0
Kernel version > 3.17
37
Have a look, shall we?
38
Q&A
39
Reference
https://docs.google.com/presentation/d/1IX-6E2Okk_bEoAq_hkDnYP9VXgc50GX6yH5Ym2F9G94/
https://docs.google.com/document/d/1WzO_QjJFfedhsiBtfcVB2QzTWRXHEPX1xOyqDGXxO-0
https://docs.google.com/document/d/1QQ5u1RBDLXWvC8K3pscTtTRThsOeBSts_imYEoRyw8A/
https://docs.google.com/document/d/1mpjPTZkoeFV3tG59149KaIuI8LhIE-cekjFq8rRmNoQ/
https://www.kernel.org/doc/Documentation/filesystems/9p.txt
https://opensource.com/business/14/7/docker-security-selinux
https://github.com/google/gvisor
https://github.com/google/gvisor/search?q=extension%3Amd&unscoped_q=extension%3Amd
http://snmlab.cs.nchu.edu.tw/course_download.asp?id=370
http://cizixs.com/2017/02/10/network-virtualization-network-namespace
http://lettieri.iet.unipi.it/virtualization/2017/vn06.pdf
http://lameleg.com/tech/docker-architech.html
https://github.com/kata-containers/documentation/blob/master/architecture.md
https://cloudplatform.googleblog.com/2018/05/Open-sourcing-gVisor-a-sandboxed-container-runtime.html
https://github.com/misterbisson/simple-container-benchmarks
http://www.linux-kongress.org/2009/slides/system_call_tracing_overhead_joerg_zinke.pdf
40

Más contenido relacionado

La actualidad más candente

containerdの概要と最近の機能
containerdの概要と最近の機能containerdの概要と最近の機能
containerdの概要と最近の機能Kohei Tokunaga
 
KubeCon EU 2016: Kubernetes Storage 101
KubeCon EU 2016: Kubernetes Storage 101KubeCon EU 2016: Kubernetes Storage 101
KubeCon EU 2016: Kubernetes Storage 101KubeAcademy
 
Head First to Container&Kubernetes
Head First to Container&KubernetesHead First to Container&Kubernetes
Head First to Container&KubernetesHungWei Chiu
 
Dockerクイックツアー
DockerクイックツアーDockerクイックツアー
DockerクイックツアーEtsuji Nakai
 
Oracle Database / Exadata Cloud 技術情報(Oracle Cloudウェビナーシリーズ: 2020年7月9日)
Oracle Database / Exadata Cloud 技術情報(Oracle Cloudウェビナーシリーズ: 2020年7月9日)Oracle Database / Exadata Cloud 技術情報(Oracle Cloudウェビナーシリーズ: 2020年7月9日)
Oracle Database / Exadata Cloud 技術情報(Oracle Cloudウェビナーシリーズ: 2020年7月9日)オラクルエンジニア通信
 
Percona XtraDB Cluster ( Ensure high Availability )
Percona XtraDB Cluster ( Ensure high Availability )Percona XtraDB Cluster ( Ensure high Availability )
Percona XtraDB Cluster ( Ensure high Availability )Mydbops
 
High availability virtualization with proxmox
High availability virtualization with proxmoxHigh availability virtualization with proxmox
High availability virtualization with proxmoxOriol Izquierdo Vibalda
 
最速・最短・最簡単でKubernetesを始めるハウツー with k0s
最速・最短・最簡単でKubernetesを始めるハウツー with k0s最速・最短・最簡単でKubernetesを始めるハウツー with k0s
最速・最短・最簡単でKubernetesを始めるハウツー with k0sKamon Nobuchika
 
Nabil Nawaz Oracle Oracle 12c Data Guard Deep Dive Presentation
Nabil Nawaz Oracle Oracle 12c Data Guard Deep Dive PresentationNabil Nawaz Oracle Oracle 12c Data Guard Deep Dive Presentation
Nabil Nawaz Oracle Oracle 12c Data Guard Deep Dive PresentationNabil Nawaz
 
Hyper-Converged Infrastructure Vx Rail
Hyper-Converged Infrastructure Vx Rail Hyper-Converged Infrastructure Vx Rail
Hyper-Converged Infrastructure Vx Rail Jürgen Ambrosi
 
Boosting I/O Performance with KVM io_uring
Boosting I/O Performance with KVM io_uringBoosting I/O Performance with KVM io_uring
Boosting I/O Performance with KVM io_uringShapeBlue
 
OpenStack vs VMware vCloud
OpenStack vs VMware vCloudOpenStack vs VMware vCloud
OpenStack vs VMware vCloudRoozbeh Shafiee
 
Automated CloudStack Deployment
Automated CloudStack DeploymentAutomated CloudStack Deployment
Automated CloudStack DeploymentShapeBlue
 
TFA Collector - what can one do with it
TFA Collector - what can one do with it TFA Collector - what can one do with it
TFA Collector - what can one do with it Sandesh Rao
 
Vce vxrail-customer-presentation new
Vce vxrail-customer-presentation newVce vxrail-customer-presentation new
Vce vxrail-customer-presentation newJennifer Graham
 
gVisor, Kata Containers, Firecracker, Docker: Who is Who in the Container Space?
gVisor, Kata Containers, Firecracker, Docker: Who is Who in the Container Space?gVisor, Kata Containers, Firecracker, Docker: Who is Who in the Container Space?
gVisor, Kata Containers, Firecracker, Docker: Who is Who in the Container Space?ArangoDB Database
 
eStargzイメージとlazy pullingによる高速なコンテナ起動
eStargzイメージとlazy pullingによる高速なコンテナ起動eStargzイメージとlazy pullingによる高速なコンテナ起動
eStargzイメージとlazy pullingによる高速なコンテナ起動Kohei Tokunaga
 
Jenkins를 활용한 Openshift CI/CD 구성
Jenkins를 활용한 Openshift CI/CD 구성 Jenkins를 활용한 Openshift CI/CD 구성
Jenkins를 활용한 Openshift CI/CD 구성 rockplace
 

La actualidad más candente (20)

containerdの概要と最近の機能
containerdの概要と最近の機能containerdの概要と最近の機能
containerdの概要と最近の機能
 
KubeCon EU 2016: Kubernetes Storage 101
KubeCon EU 2016: Kubernetes Storage 101KubeCon EU 2016: Kubernetes Storage 101
KubeCon EU 2016: Kubernetes Storage 101
 
Head First to Container&Kubernetes
Head First to Container&KubernetesHead First to Container&Kubernetes
Head First to Container&Kubernetes
 
Dockerクイックツアー
DockerクイックツアーDockerクイックツアー
Dockerクイックツアー
 
Oracle Database / Exadata Cloud 技術情報(Oracle Cloudウェビナーシリーズ: 2020年7月9日)
Oracle Database / Exadata Cloud 技術情報(Oracle Cloudウェビナーシリーズ: 2020年7月9日)Oracle Database / Exadata Cloud 技術情報(Oracle Cloudウェビナーシリーズ: 2020年7月9日)
Oracle Database / Exadata Cloud 技術情報(Oracle Cloudウェビナーシリーズ: 2020年7月9日)
 
Percona XtraDB Cluster ( Ensure high Availability )
Percona XtraDB Cluster ( Ensure high Availability )Percona XtraDB Cluster ( Ensure high Availability )
Percona XtraDB Cluster ( Ensure high Availability )
 
Zero Data Loss Recovery Appliance 設定手順例
Zero Data Loss Recovery Appliance 設定手順例Zero Data Loss Recovery Appliance 設定手順例
Zero Data Loss Recovery Appliance 設定手順例
 
High availability virtualization with proxmox
High availability virtualization with proxmoxHigh availability virtualization with proxmox
High availability virtualization with proxmox
 
最速・最短・最簡単でKubernetesを始めるハウツー with k0s
最速・最短・最簡単でKubernetesを始めるハウツー with k0s最速・最短・最簡単でKubernetesを始めるハウツー with k0s
最速・最短・最簡単でKubernetesを始めるハウツー with k0s
 
Nabil Nawaz Oracle Oracle 12c Data Guard Deep Dive Presentation
Nabil Nawaz Oracle Oracle 12c Data Guard Deep Dive PresentationNabil Nawaz Oracle Oracle 12c Data Guard Deep Dive Presentation
Nabil Nawaz Oracle Oracle 12c Data Guard Deep Dive Presentation
 
Hyper-Converged Infrastructure Vx Rail
Hyper-Converged Infrastructure Vx Rail Hyper-Converged Infrastructure Vx Rail
Hyper-Converged Infrastructure Vx Rail
 
ZFS
ZFSZFS
ZFS
 
Boosting I/O Performance with KVM io_uring
Boosting I/O Performance with KVM io_uringBoosting I/O Performance with KVM io_uring
Boosting I/O Performance with KVM io_uring
 
OpenStack vs VMware vCloud
OpenStack vs VMware vCloudOpenStack vs VMware vCloud
OpenStack vs VMware vCloud
 
Automated CloudStack Deployment
Automated CloudStack DeploymentAutomated CloudStack Deployment
Automated CloudStack Deployment
 
TFA Collector - what can one do with it
TFA Collector - what can one do with it TFA Collector - what can one do with it
TFA Collector - what can one do with it
 
Vce vxrail-customer-presentation new
Vce vxrail-customer-presentation newVce vxrail-customer-presentation new
Vce vxrail-customer-presentation new
 
gVisor, Kata Containers, Firecracker, Docker: Who is Who in the Container Space?
gVisor, Kata Containers, Firecracker, Docker: Who is Who in the Container Space?gVisor, Kata Containers, Firecracker, Docker: Who is Who in the Container Space?
gVisor, Kata Containers, Firecracker, Docker: Who is Who in the Container Space?
 
eStargzイメージとlazy pullingによる高速なコンテナ起動
eStargzイメージとlazy pullingによる高速なコンテナ起動eStargzイメージとlazy pullingによる高速なコンテナ起動
eStargzイメージとlazy pullingによる高速なコンテナ起動
 
Jenkins를 활용한 Openshift CI/CD 구성
Jenkins를 활용한 Openshift CI/CD 구성 Jenkins를 활용한 Openshift CI/CD 구성
Jenkins를 활용한 Openshift CI/CD 구성
 

Similar a Secure container: Kata container and gVisor

Securing Applications and Pipelines on a Container Platform
Securing Applications and Pipelines on a Container PlatformSecuring Applications and Pipelines on a Container Platform
Securing Applications and Pipelines on a Container PlatformAll Things Open
 
Securing Applications and Pipelines on a Container Platform
Securing Applications and Pipelines on a Container PlatformSecuring Applications and Pipelines on a Container Platform
Securing Applications and Pipelines on a Container PlatformAll Things Open
 
Unraveling Docker Security: Lessons From a Production Cloud
Unraveling Docker Security: Lessons From a Production CloudUnraveling Docker Security: Lessons From a Production Cloud
Unraveling Docker Security: Lessons From a Production CloudSalman Baset
 
Tokyo OpenStack Summit 2015: Unraveling Docker Security
Tokyo OpenStack Summit 2015: Unraveling Docker SecurityTokyo OpenStack Summit 2015: Unraveling Docker Security
Tokyo OpenStack Summit 2015: Unraveling Docker SecurityPhil Estes
 
How Secure Is Your Container? ContainerCon Berlin 2016
How Secure Is Your Container? ContainerCon Berlin 2016How Secure Is Your Container? ContainerCon Berlin 2016
How Secure Is Your Container? ContainerCon Berlin 2016Phil Estes
 
Security on a Container Platform
Security on a Container PlatformSecurity on a Container Platform
Security on a Container PlatformAll Things Open
 
Lions, Tigers and Deers: What building zoos can teach us about securing micro...
Lions, Tigers and Deers: What building zoos can teach us about securing micro...Lions, Tigers and Deers: What building zoos can teach us about securing micro...
Lions, Tigers and Deers: What building zoos can teach us about securing micro...Sysdig
 
Docker Security: Are Your Containers Tightly Secured to the Ship?
Docker Security: Are Your Containers Tightly Secured to the Ship?Docker Security: Are Your Containers Tightly Secured to the Ship?
Docker Security: Are Your Containers Tightly Secured to the Ship?Michael Boelen
 
Docker London: Container Security
Docker London: Container SecurityDocker London: Container Security
Docker London: Container SecurityPhil Estes
 
Lightweight Virtualization in Linux
Lightweight Virtualization in LinuxLightweight Virtualization in Linux
Lightweight Virtualization in LinuxSadegh Dorri N.
 
Containers and workload security an overview
Containers and workload security an overview Containers and workload security an overview
Containers and workload security an overview Krishna-Kumar
 
Docker Security
Docker SecurityDocker Security
Docker Securityantitree
 
Docker, Linux Containers (LXC), and security
Docker, Linux Containers (LXC), and securityDocker, Linux Containers (LXC), and security
Docker, Linux Containers (LXC), and securityJérôme Petazzoni
 
Container & kubernetes
Container & kubernetesContainer & kubernetes
Container & kubernetesTed Jung
 
Rootless Containers
Rootless ContainersRootless Containers
Rootless ContainersAkihiro Suda
 
Docker, Linux Containers, and Security: Does It Add Up?
Docker, Linux Containers, and Security: Does It Add Up?Docker, Linux Containers, and Security: Does It Add Up?
Docker, Linux Containers, and Security: Does It Add Up?Jérôme Petazzoni
 
The State of Kubernetes Security
The State of Kubernetes Security The State of Kubernetes Security
The State of Kubernetes Security Jimmy Mesta
 

Similar a Secure container: Kata container and gVisor (20)

Securing Applications and Pipelines on a Container Platform
Securing Applications and Pipelines on a Container PlatformSecuring Applications and Pipelines on a Container Platform
Securing Applications and Pipelines on a Container Platform
 
Securing Applications and Pipelines on a Container Platform
Securing Applications and Pipelines on a Container PlatformSecuring Applications and Pipelines on a Container Platform
Securing Applications and Pipelines on a Container Platform
 
Unraveling Docker Security: Lessons From a Production Cloud
Unraveling Docker Security: Lessons From a Production CloudUnraveling Docker Security: Lessons From a Production Cloud
Unraveling Docker Security: Lessons From a Production Cloud
 
Tokyo OpenStack Summit 2015: Unraveling Docker Security
Tokyo OpenStack Summit 2015: Unraveling Docker SecurityTokyo OpenStack Summit 2015: Unraveling Docker Security
Tokyo OpenStack Summit 2015: Unraveling Docker Security
 
How Secure Is Your Container? ContainerCon Berlin 2016
How Secure Is Your Container? ContainerCon Berlin 2016How Secure Is Your Container? ContainerCon Berlin 2016
How Secure Is Your Container? ContainerCon Berlin 2016
 
Security on a Container Platform
Security on a Container PlatformSecurity on a Container Platform
Security on a Container Platform
 
Lions, Tigers and Deers: What building zoos can teach us about securing micro...
Lions, Tigers and Deers: What building zoos can teach us about securing micro...Lions, Tigers and Deers: What building zoos can teach us about securing micro...
Lions, Tigers and Deers: What building zoos can teach us about securing micro...
 
Dockers zero to hero
Dockers zero to heroDockers zero to hero
Dockers zero to hero
 
Docker Security: Are Your Containers Tightly Secured to the Ship?
Docker Security: Are Your Containers Tightly Secured to the Ship?Docker Security: Are Your Containers Tightly Secured to the Ship?
Docker Security: Are Your Containers Tightly Secured to the Ship?
 
Docker London: Container Security
Docker London: Container SecurityDocker London: Container Security
Docker London: Container Security
 
Lightweight Virtualization in Linux
Lightweight Virtualization in LinuxLightweight Virtualization in Linux
Lightweight Virtualization in Linux
 
Containers and workload security an overview
Containers and workload security an overview Containers and workload security an overview
Containers and workload security an overview
 
Containers > VMs
Containers > VMsContainers > VMs
Containers > VMs
 
Docker Security
Docker SecurityDocker Security
Docker Security
 
Docker, Linux Containers (LXC), and security
Docker, Linux Containers (LXC), and securityDocker, Linux Containers (LXC), and security
Docker, Linux Containers (LXC), and security
 
Container & kubernetes
Container & kubernetesContainer & kubernetes
Container & kubernetes
 
Rootless Containers
Rootless ContainersRootless Containers
Rootless Containers
 
Docker, Linux Containers, and Security: Does It Add Up?
Docker, Linux Containers, and Security: Does It Add Up?Docker, Linux Containers, and Security: Does It Add Up?
Docker, Linux Containers, and Security: Does It Add Up?
 
Exploring Docker Security
Exploring Docker SecurityExploring Docker Security
Exploring Docker Security
 
The State of Kubernetes Security
The State of Kubernetes Security The State of Kubernetes Security
The State of Kubernetes Security
 

Último

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Último (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Secure container: Kata container and gVisor

Notas del editor

  1. K8s 訂定的 Sanbox proposal
  2. K8s 訂定的 Sanbox proposal
  3. K8s 訂定的 Sanbox proposal
  4. K8s 訂定的 Sanbox proposal
  5. K8s 訂定的 Sanbox proposal
  6. 這裡的 container 指的是 container runtime 像是 runc, lxc, lxd
  7. 猜猜看 gVisor 用什麼語言實作 User space kernel
  8. Why Go? gVisor was written in Go in order to avoid security pitfalls that can plague kernels. With Go, there are strong types, built-in bounds checks, no uninitialized variables, no use-after-free, no stack overflow, and a built-in race detector.
  9. Direct Device Assignment SRIOV NVDIMM Multi-OS KSM throttling CRI-O native support MacVTap, multi-queue net Multi Architecture Multi Hypervisor Full Hotplug K8s Multi Tenancy VM templating Frakti native support Traffic Controller net
  10. Kernel 把不需要的 module 拔除,diff 預設 config 大約拔掉了 681 個 module 和 功能,有趣的是 CONFIG_RANDOMIZE_BASE (KASLR) 關掉了
  11. 一般的方式會在 host 和 VM 中各別占有 memory cache 且 效能較低 KataContainer 選擇將 rootfs 透過 shared memory 直接映射到 VM 當中 雖然會使用一個 kernel 大小的 memory 但可以透過 share 的方式 讓多個 Container 使用同一 memory ,提升效能並降低記憶體使用量
  12. 為什麼不要經過 kernel 有哪些好處