Exploiting Kubernetes' Image Pull Implementation to Deny Node Availability
Abstract: Kubernetes (K8s) has grown in popularity over the past few years to become the de-facto standard for container orchestration in cloud-native environments. While research is not new to topics such as containerization and access control security, the Application Programming Interface (API) interactions between K8s and its runtime interfaces have not been studied thoroughly. In particular, the CRI-API is responsible for abstracting the container runtime, managing the creation and lifecycle of containers along with the downloads of the respective images. However, this decoupling of concerns and the abstraction of the container runtime renders K8s unaware of the status of the downloading process of the container images, obstructing the monitoring of the resources allocated to such process. In this paper, we discuss how this lack of status information can be exploited as a Denial of Service attack in a K8s cluster. We show that such attacks can generate up to 95% average CPU usage, prevent downloading new container images, and increase I/O and network usage for a potentially unlimited amount of time. Finally, we propose two possible mitigation strategies: one, implemented as a stopgap solution, and another, requiring more radical architectural changes in the relationship between K8s and the CRI-API.
- B. Burns, B. Grant, D. Oppenheimer, E. Brewer, and J. Wilkes, “Borg, Omega, and Kubernetes,” Communications of the ACM, vol. 59, no. 5, pp. 50–57, Apr. 2016. [Online]. Available: https://dl.acm.org/doi/10.1145/2890784
- A. Rahman, S. I. Shamim, D. B. Bose, and R. Pandita, “Security Misconfigurations in Open Source Kubernetes Manifests: An Empirical Study,” ACM Transactions on Software Engineering and Methodology, vol. 32, no. 4, pp. 99:1–99:36, May 2023. [Online]. Available: https://doi.org/10.1145/3579639
- Y. He, R. Guo, Y. Xing, X. Che, K. Sun, Z. Liu, K. Xu, and Q. Li, “Cross Container Attacks: The Bewildered eBPF on Clouds,” in Proceedings of the 32nd USENIX Security Symposium, 2023, pp. 5971–5988. [Online]. Available: https://www.usenix.org/conference/usenixsecurity23/presentation/he
- J. Xiao, N. Yang, W. Shen, J. Li, X. Guo, Z. Dong, F. Xie, and J. Ma, “Attacks are Forwarded: Breaking the Isolation of MicroVM-based Containers Through Operation Forwarding,” in Proceedings of the 32nd USENIX Security Symposium, 2023, pp. 7517–7534. [Online]. Available: https://www.usenix.org/conference/usenixsecurity23/presentation/xiao-jietao
- J. G. Almaraz-Rivera, “An Anomaly-based Detection System for Monitoring Kubernetes Infrastructures,” IEEE Latin America Transactions, vol. 21, no. 3, pp. 457–465, Mar. 2023, number: 3. [Online]. Available: https://latamt.ieeer9.org/index.php/transactions/article/view/7408
- C. Carrión, “Kubernetes Scheduling: Taxonomy, Ongoing Issues and Challenges,” ACM Computing Surveys, vol. 55, no. 7, pp. 1–37, Jul. 2023. [Online]. Available: https://dl.acm.org/doi/10.1145/3539606
- F. Minna, A. Blaise, F. Rebecchi, B. Chandrasekaran, and F. Massacci, “Understanding the Security Implications of Kubernetes Networking,” IEEE Security & Privacy, vol. 19, no. 5, pp. 46–56, Sep. 2021. [Online]. Available: https://ieeexplore.ieee.org/document/9497237
- Kubernetes, “Kubernetes - Production-Grade Container Orchestration,” 2023. [Online]. Available: https://kubernetes.io/
- D. Balla, M. Maliosz, and C. Simon, “Open Source FaaS Performance Aspects,” in 2020 43rd International Conference on Telecommunications and Signal Processing (TSP), Jul. 2020, pp. 358–364. [Online]. Available: https://ieeexplore.ieee.org/document/9163456
- gRPC Authors, “gRPC,” 2023. [Online]. Available: https://grpc.io/
- X. Wang, J. Du, and H. Liu, “Performance and isolation analysis of RunC, gVisor and Kata Containers runtimes,” Cluster Computing, vol. 25, no. 2, pp. 1497–1513, Apr. 2022. [Online]. Available: https://link.springer.com/10.1007/s10586-021-03517-8
- L. Larsson, W. Tärneberg, C. Klein, E. Elmroth, and M. Kihl, “Impact of etcd deployment on Kubernetes, Istio, and application performance,” Software: Practice and Experience, vol. 50, no. 10, pp. 1986–2007, Oct. 2020. [Online]. Available: https://onlinelibrary.wiley.com/doi/10.1002/spe.2885
- Z. Li, W. Liu, H. Chen, X. Wang, X. Liao, L. Xing, M. Zha, H. Jin, and D. Zou, “Robbery on DevOps: Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms,” in 2022 IEEE Symposium on Security and Privacy (SP), May 2022, pp. 2397–2412. [Online]. Available: https://ieeexplore.ieee.org/document/9833803
- M. Iorio, F. Risso, A. Palesandro, L. Camiciotti, and A. Manzalini, “Computing Without Borders: The Way Towards Liquid Computing,” IEEE Transactions on Cloud Computing, pp. 1–18, 2022. [Online]. Available: https://ieeexplore.ieee.org/document/9984946/
- Sysdig, “Cloud-Native Security and Usage Report,” Sysdig, Tech. Rep., 2023. [Online]. Available: https://sysdig.com/2023-cloud-native-security-and-usage-report/
- L. A. Dias Knob, M. Franzil, and D. Siracusa, “On Exploiting gzip’s Content-Dependent Compression,” 2023. [Online]. Available: https://github.com/risingfbk/gzip-compression-tests
- Phoronix Media, “Phoronix Test Suite,” Sep. 2023, original-date: 2014-01-12T04:56:38Z. [Online]. Available: https://github.com/phoronix-test-suite/phoronix-test-suite
- L. A. Dias Knob, M. Franzil, and D. Siracusa, “MAGI System,” 2023, original-date: 2023-09-20T09:32:40Z. [Online]. Available: https://github.com/risingfbk/magi
- ——, “containerdsnoop,” 2023. [Online]. Available: https://github.com/risingfbk/containerdsnoop
- Z. Ng, “dockersnoop,” Jun. 2023. [Online]. Available: https://github.com/stwind/dockersnoop
- L. A. Dias Knob, M. Franzil, and D. Siracusa, “imagesnoop,” 2023, original-date: 2024-01-19T09:18:45Z. [Online]. Available: https://github.com/risingfbk/imagesnoop
- Google Cloud Platform, “Microservices Demo,” Sep. 2023, original-date: 2018-08-03T18:32:18Z. [Online]. Available: https://github.com/GoogleCloudPlatform/microservices-demo
- V. Varadarajan, T. Kooburat, B. Farley, T. Ristenpart, and M. M. Swift, “Resource-freeing attacks: improve your cloud performance (at your neighbor’s expense),” in Proceedings of the 2012 ACM conference on Computer and communications security. Raleigh North Carolina USA: ACM, Oct. 2012, pp. 281–292. [Online]. Available: https://dl.acm.org/doi/10.1145/2382196.2382228
- C. Fang, N. Nazari, B. Omidi, H. Wang, A. Puri, M. Arora, S. Rafatirad, H. Homayoun, and K. N. Khasawneh, “HeteroScore: Evaluating and Mitigating Cloud Security Threats Brought by Heterogeneity,” in Proceedings 2023 Network and Distributed System Security Symposium. San Diego, CA, USA: Internet Society, 2023. [Online]. Available: https://www.ndss-symposium.org/wp-content/uploads/2023/02/ndss2023_f996_paper.pdf
- C. Fang, H. Wang, N. Nazari, B. Omidi, A. Sasan, K. N. Khasawneh, S. Rafatirad, and H. Homayoun, “Repttack: Exploiting Cloud Schedulers to Guide Co-Location Attacks,” in Proceedings 2022 Network and Distributed System Security Symposium. San Diego, CA, USA: Internet Society, 2022. [Online]. Available: https://www.ndss-symposium.org/wp-content/uploads/2022-149-paper.pdf
- M. Zhan, Y. Li, H. Yang, G. Yu, B. Li, and W. Wang, “Coda: Runtime Detection of Application-Layer CPU-Exhaustion DoS Attacks in Containers,” IEEE Transactions on Services Computing, vol. 16, no. 3, pp. 1686–1697, May 2023, conference Name: IEEE Transactions on Services Computing. [Online]. Available: https://ieeexplore.ieee.org/document/9842371
- A. Ahmed and G. Pierre, “Docker-pi: Docker container deployment in fog computing infrastructures,” International Journal of Cloud Computing, vol. 9, no. 1, pp. 6–27, Jan. 2020, publisher: Inderscience Publishers. [Online]. Available: https://www.inderscienceonline.com/doi/abs/10.1504/IJCC.2020.105885
- A. Yolchuyev, “Extreme Gradient Boosting based Anomaly detection for Kubernetes Orchestration,” in 2023 27th International Conference on Information Technology (IT), Feb. 2023, pp. 1–4. [Online]. Available: https://ieeexplore.ieee.org/document/10078576/
Paper Prompts
Sign up for free to create and run prompts on this paper using GPT-5.
Top Community Prompts
Collections
Sign up for free to add this paper to one or more collections.