-
Notifications
You must be signed in to change notification settings - Fork 55
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
terraform: allow GCP console access without opening debugd port #3357
Conversation
157b4f0
to
1d013a6
Compare
1d013a6
to
e66e47e
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The change LGTM, but I don't quite understand the argument in the description: are you saying that we've been exposing the debug port when using a non-debug console image before? I don't see how, and this PR does not seem to address that.
If someone were to try and get console access to a GCP console image before, he would have to enable the |
Why is this necessary? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
As discussed via message, I'd like to discuss this in-person first.
IMO, having an exposed port for an undefined service could grant attackers access to our infrastructure and is not desirable |
cdcb6dd
to
a2c1419
Compare
Context
On GCP, access to the serial console needs to be enabled via a metadata attribute. Previously, this has always been set to the
debug
variable, that also opens up the debugd port, which is unnecessary and potentially security-relevant for non-debug images, where arbitrary other services could bind to the debugd port by accident.Proposed change(s)
Checklist