Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/moolen/skouter
🛡️ cloud-native eBPF node egress firewall
https://github.com/moolen/skouter
dns ebpf kubernetes
Last synced: about 1 month ago
JSON representation
🛡️ cloud-native eBPF node egress firewall
- Host: GitHub
- URL: https://github.com/moolen/skouter
- Owner: moolen
- Created: 2023-01-01T12:44:20.000Z (almost 2 years ago)
- Default Branch: main
- Last Pushed: 2023-02-19T21:30:14.000Z (almost 2 years ago)
- Last Synced: 2024-04-14T19:12:58.779Z (8 months ago)
- Topics: dns, ebpf, kubernetes
- Language: C
- Homepage:
- Size: 985 KB
- Stars: 4
- Watchers: 2
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Skouter
cloud-native egress proxy.
---
## Overview
![overview](overview.png)
## Rationale
This is a counter-draft to the traditional centralized egress firewall approach.
Requirements:
- provide a **DNS-based firewall** to allow/deny egress traffic
- **no change of existing applications needed**: an app must not rely on `HTTP_PROXY` env variables or iptables traffic redirection
- **no central infrastructure** for egress filtering: No single point of failure. Eliminate complexity introduced by HA architecture like leader election, state replication, snapshots for DR, VRRP.
- is capable of filtering **host** egress traffic
- supports audit mode that allows to discover traffic patterns before blocking themIt runs on the tc egress hook. Essentially, all traffic from the host that goes through that interface is subject to egress policies.
It parses the DNS response packets from the trusted DNS server and allows/blocks traffic egressing from the system.There are other implemenatation approaches for egress filtering:
- L7: HTTP Proxy
- L7|L4: HTTP(S) CONNECT
- L5+: TLS SNI
- L3|L4: IP CIDRs + ports
- K8s Operator like https://github.com/giantswarm/dns-network-policy-operator### Limitations and edge cases
* DNS over TCP is not supported, currently
* IPv6 is not yet supported
* may interfere with other eBPF-based tools (e.g. cilium)
* depending on the CNI implementation, pods may also be subject to the same egress policies as the host (overlay networking)## Further improvements
- [ ] ~~implement DNS parsing in eBPF (beware, there be dragons!)~~ This is completely nuts
- [x] validate kube-dns source/dest IP for DNS lookups
- [x] track source port/id of DNS query and match it with response (make spoofing harder)
- [ ] support DNS over TCP
- [x] support CNAME records
- [x] packet-level metrics
- [x] regex hostnames
- [ ] support IPv6
- [x] block host traffic
- [x] support plain IPs
- [x] support IP cidr ranges
- [x] audit mode (allow egress by default but log/store traffic patterns)
- [x] clean up deleted IPs
- [x] drop initial DNS answer and respond from userspace
- [x] ~~lift limitation of 256 adresses per node~~
- [ ] consider pivoting into making this a central egress infrastructure by ip forwarding ip packets while still supporting kubernetes integration## Example
Given this egress config:
```yaml
apiVersion: egress.skouter/v1alpha1
kind: Egress
metadata:
name: example
spec:
# use nodeSelector to set up
# host firewall
nodeSelector: {}
rules:
- domains:
- example.com
- httpbin.org
- ips:
- 1.2.3.4
- 5.7.3.1
- cidrs:
- 127.0.0.1/8
- 10.0.10.0/24
- regex:
- .*\.wikipedia\.org # de|en|...
```On the host system, try make HTTP calls to verify the behaviour:
```shell
% wget -O - example.com
Connecting to example.com (93.184.216.34:80)
writing to stdoutExample Domain
[...]% wget -O - github.com --timeout 5
Connecting to github.com (140.82.121.3:80)
wget: download timed out
```