question-mark
Stuck on an issue?

Lightrun Answers was designed to reduce the constant googling that comes with debugging 3rd party libraries. It collects links to all the places you might be looking at while hunting down a tough bug.

And, if you’re still stuck at the end, we’re happy to hop on a call to see how we can help out.

Bad practices related to security in jitsi images

See original GitHub issue

For example, in Kubernetes it would be normal to run containers with such directives:

securityContext:
      allowPrivilegeEscalation: false
      capabilities:
        drop:
        - ALL
      readOnlyRootFilesystem: true

Various DevSecOps tools check these directives, for example https://docs.kics.io/queries/kubernetes-queries

But jitsi images prevent such important settings from being applied

Perhaps this needs revision? Otherwise, security is seriously affected

How can we avoid using https://github.com/just-containers/s6-overlay? It seems we need to keep something like this in our mind https://github.com/GoogleContainerTools/distroless and try to move in this direction

Issue Analytics

  • State:open
  • Created 2 years ago
  • Reactions:1
  • Comments:7 (5 by maintainers)

github_iconTop GitHub Comments

3reactions
ghostcommented, Apr 8, 2021

Summarize what? Read the first comment carefully.

No container runs with extended capabilities

NET_RAW capability and readOnlyRootFilesystem false = already extended capabilities

And there is nothing we can do thanks to the images. That’s the problem.

1reaction
saghulcommented, Apr 8, 2021

@saghul I think once we move s6-overlay to use user other than the root then most of the things would be fixed. As of now we can’t start the container without root user as S6-overlay uses it for managing configuration. We can try version 2.X.X as they have introduced User directive(run S6-overlay without root user) in this version.

Indeed experimenting with 2.X.X should be the way to go here.

@Ais8Ooz8 we get it that this question is more about the best practices for running containers. But there are services like jibri where we require root access for /dev/shm hence it wouldn’t be easy to make them work with non-root user. It would be great if you can create a PR and help the community.

IIRC there is a command line flag to prevent Chromium from using /dev/shm, but we can see how to cross that river when we get there.

Read more comments on GitHub >

github_iconTop Results From Across the Web

Safety concerns · Issue #5653 · jitsi/jitsi-meet
Always use secure meeting names (thanks to Room name warning #6754 there will now be a warning about insecure ones). Even when using...
Read more >
Jitsi Meet Security & Privacy
How secure is Jitsi? Learn more about the Jitsi Meet Security & Privacy information, including how ... We are also working on a...
Read more >
Jitsi Meet on Docker default passwords - how bad is it ...
Jitsi Meet on Docker contained default passwords for important users, which could be abused to run administrative XMPP commands, including ...
Read more >
The Ultimate Guide to Jitsi Meet and JaaS
First, you need to have a Linux server somewhere. Several cloud providers have images or app packages specifically for Jitsi Meet. I looked...
Read more >
A closer look at Skype for business and Jitsi Meet
However, a medium-severity security bug was recorded with NIST in 2017. As of April 29, 2020, another potentially serious vulnerability is under ...
Read more >

github_iconTop Related Medium Post

No results found

github_iconTop Related StackOverflow Question

No results found

github_iconTroubleshoot Live Code

Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start Free

github_iconTop Related Reddit Thread

No results found

github_iconTop Related Hackernoon Post

No results found

github_iconTop Related Tweet

No results found

github_iconTop Related Dev.to Post

No results found

github_iconTop Related Hashnode Post

No results found