 Istio audit report - ADA Logics - 2023-01-30 - v1.0subsequently exploit it. Contributors to 3rd party dependencies Istio uses open source 3rd party dependencies that may impact the security of Istio. Istio's dependencies may be used by malicious attackers to exceed similarly to contributors to Istio itself - seek to commit vulnerable code into the source tree of dependencies of Istio to subsequently exploit it. Untrusted users Istio will o�en be deployed with the purpose Authenticated ⛔ ⛔ ⛔ Provenance - Service generated ⛔ ⛔ ⛔ Provenance - Non-falsifiable ⛔ ⛔ Provenance - Dependencies complete ⛔ Provenance - Identifies artifact ⛔ ⛔ ⛔ ⛔ Provenance - Identifies builder ⛔ ⛔ ⛔ ⛔0 码力 | 55 页 | 703.94 KB | 1 年前3 Istio audit report - ADA Logics - 2023-01-30 - v1.0subsequently exploit it. Contributors to 3rd party dependencies Istio uses open source 3rd party dependencies that may impact the security of Istio. Istio's dependencies may be used by malicious attackers to exceed similarly to contributors to Istio itself - seek to commit vulnerable code into the source tree of dependencies of Istio to subsequently exploit it. Untrusted users Istio will o�en be deployed with the purpose Authenticated ⛔ ⛔ ⛔ Provenance - Service generated ⛔ ⛔ ⛔ Provenance - Non-falsifiable ⛔ ⛔ Provenance - Dependencies complete ⛔ Provenance - Identifies artifact ⛔ ⛔ ⛔ ⛔ Provenance - Identifies builder ⛔ ⛔ ⛔ ⛔0 码力 | 55 页 | 703.94 KB | 1 年前3
 Leveraging Istio for Creating API Tests - Low Effort API Testing for Microservicesprevious API request • Context propagation rarely obvious Challenge • Dependencies require lot of time to code • Many dependencies in a test suite • Dependency maintenance is effort intensive Solution0 码力 | 21 页 | 1.09 MB | 1 年前3 Leveraging Istio for Creating API Tests - Low Effort API Testing for Microservicesprevious API request • Context propagation rarely obvious Challenge • Dependencies require lot of time to code • Many dependencies in a test suite • Dependency maintenance is effort intensive Solution0 码力 | 21 页 | 1.09 MB | 1 年前3
 Istio is a long wild river: how to navigate it safelyThe Sidecar CRD to save the mesh Stabilizing Istio Main drawback Services must know their dependencies, document and update them. If this wasn’t the case before, Istio may not feel welcoming to users generate Sidecar ● Use protocol specific traffic sniffing (i.e. gRPC call discovery) to find out dependencies ● eBPF magic to get service calls? We use the first approach currently as it is protocol-agnostic0 码力 | 69 页 | 1.58 MB | 1 年前3 Istio is a long wild river: how to navigate it safelyThe Sidecar CRD to save the mesh Stabilizing Istio Main drawback Services must know their dependencies, document and update them. If this wasn’t the case before, Istio may not feel welcoming to users generate Sidecar ● Use protocol specific traffic sniffing (i.e. gRPC call discovery) to find out dependencies ● eBPF magic to get service calls? We use the first approach currently as it is protocol-agnostic0 码力 | 69 页 | 1.58 MB | 1 年前3
 Istio Security Assessment(line 172) • istio/istio/mixer/pkg/perf/run.go (line 106) • istio/istio/tools/istio-iptables/pkg/dependencies/implementation.go (line 30) • istio/istio/cni/cmd/istio-cni/iptables.go (line 59) • istio/ist location().Path) cmd.Stdout = os.Stdout cmd.Stderr = os.Stderr • istio/istio/tools/istio-iptables/pkg/dependencies/implementation.go (line 30) func (r *RealDependencies) execute(cmd string, redirectStdout bool0 码力 | 51 页 | 849.66 KB | 1 年前3 Istio Security Assessment(line 172) • istio/istio/mixer/pkg/perf/run.go (line 106) • istio/istio/tools/istio-iptables/pkg/dependencies/implementation.go (line 30) • istio/istio/cni/cmd/istio-cni/iptables.go (line 59) • istio/ist location().Path) cmd.Stdout = os.Stdout cmd.Stderr = os.Stderr • istio/istio/tools/istio-iptables/pkg/dependencies/implementation.go (line 30) func (r *RealDependencies) execute(cmd string, redirectStdout bool0 码力 | 51 页 | 849.66 KB | 1 年前3
 Developing & Debugging WebAssembly FiltersSecure and Reliable: Wasm runs in isolated VM, can dynamically update w/o Envoy restarts, no hard dependencies or cascading failures Speed: Near native performance Sustainable: Eliminates need to recompile0 码力 | 22 页 | 2.22 MB | 1 年前3 Developing & Debugging WebAssembly FiltersSecure and Reliable: Wasm runs in isolated VM, can dynamically update w/o Envoy restarts, no hard dependencies or cascading failures Speed: Near native performance Sustainable: Eliminates need to recompile0 码力 | 22 页 | 2.22 MB | 1 年前3
 Istio at Scale: How eBay is building a massive Multitenant Service Mesh using Istio● L4 Micro-segmentation Solution ○ Central Policy store capturing Application-to-Application dependencies ○ Controllers watch K8s clusters and translate policies into K8s NetworkPolicies to be enforced0 码力 | 22 页 | 505.96 KB | 1 年前3 Istio at Scale: How eBay is building a massive Multitenant Service Mesh using Istio● L4 Micro-segmentation Solution ○ Central Policy store capturing Application-to-Application dependencies ○ Controllers watch K8s clusters and translate policies into K8s NetworkPolicies to be enforced0 码力 | 22 页 | 505.96 KB | 1 年前3
共 6 条
- 1













