Pre-exploit mitigation
Is there an existing issue for this?
- [x] I have searched the existing issues
Is your feature request related to a problem?
Do you intend to broaden pre-exploit mitigation efforts? Which direction do you see this going?
Is it correct to say that the criticism of Tetragon isn't entirely accurate, since error injection is possible? You write that "only system calls and security check functions allow their return value to be changed in this manner" so does that mean some classes of exploits might still be missed? How do you view KubeArmor’s strategy?
Describe the feature you would like
Implementation of pre-exploit mitigation for all classes of exploits
Describe your proposed solution
No response
Code of Conduct
- [x] I agree to follow this project's Code of Conduct
Hey, yeah things have changed since the blogpost by grsecurity was written (3/4 years ago now), iirc the post was mostly complaining about wording in one of our blogpost.
Is it correct to say that the criticism of Tetragon isn't entirely accurate, since error injection is possible?
Indeed, I didn't know this blogpost by AccuKnow but it seems they haven't investigated enough, so from a feature PoV, the comparison seems unfair.
You write that "only system calls and security check functions allow their return value to be changed in this manner" so does that mean some classes of exploits might still be missed?
It just limits how you can write the TracingPolicy, but this is a Linux limitation (not a Tetragon one), because you wouldn't change the return value of any function in the kernel (it would quickly crash your system). We support also LSM security hooks now directly instead of using kprobes + security hooks.
How do you view KubeArmor’s strategy?
I don't really know much about KubeArmor unfortunately so I'd avoid making comments to not make mistakes.
Also, for this kind of discussion, the Slack channel or the community meetings might be more suited than a GitHub issue.
@mtardy BTW, how effective is Tetragon for Network Observability? Does it significantly impact resource consumption? What are its weaknesses? I've heard the opinion that this isn't practical, as there are too many events. It makes more sense to intercept security_socket_create or inet_csk_listen_start, i.e., just some of the network events. Should it be used in conjunction with Cilium?
@mtardy BTW, how effective is Tetragon for Network Observability? Does it significantly impact resource consumption? What are its weaknesses? I've heard the opinion that this isn't practical, as there are too many events. It makes more sense to intercept
security_socket_createorinet_csk_listen_start, i.e., just some of the network events. Should it be used in conjunction with Cilium?
You can use in conjunction with Cilium but it doesn't provide any particular benefit. Tetragon can run standalone.
Now for network, you need to find the strategy that suits you indeed because you can provide a lot of events, we provide a few policies from the docs and examples.