Managing security context constraints

    Security context constraints allow an administrator to control:

    • Whether a pod can run privileged containers

    • The capabilities that a container can request

    • The use of host directories as volumes

    • The SELinux context of the container

    • The container user ID

    • The use of host namespaces and networking

    • The allocation of an that owns the pod volumes

    • The configuration of allowable supplemental groups

    • Whether a container requires write access to its root file system

    • The usage of volume types

    • The configuration of allowable seccomp profiles

    The cluster contains several default security context constraints (SCCs) as described in the table below. Additional SCCs might be installed when you install Operators or other components to OKD.

    Do not modify the default SCCs. Customizing the default SCCs can lead to issues when some of the platform pods deploy or OKD is upgraded. During upgrades between some versions of OKD, the values of the default SCCs are reset to the default values, which discards all customizations to those SCCs. Instead, create new SCCs as needed.

    Table 1. Default security context constraints
    Security context constraintDescription

    anyuid

    Provides all features of the restricted SCC, but allows users to run with any UID and any GID.

    hostaccess

    Allows access to all host namespaces but still requires pods to be run with a UID and SELinux context that are allocated to the namespace.

    This SCC allows host access to namespaces, file systems, and PIDS. It should only be used by trusted pods. Grant with caution.

    hostmount-anyuid

    Provides all the features of the restricted SCC, but allows host mounts and running as any UID and any GID on the system.

    This SCC allows host file system access as any UID, including UID 0. Grant with caution.

    hostnetwork

    Allows using host networking and host ports but still requires pods to be run with a UID and SELinux context that are allocated to the namespace.

    If additional workloads are run on control plane hosts (also known as the master hosts), use caution when providing access to hostnetwork. A workload that runs hostnetwork on a control plane host is effectively root on the cluster and must be trusted accordingly.

    node-exporter

    Used for the Prometheus node exporter.

    This SCC allows host file system access as any UID, including UID 0. Grant with caution.

    nonroot

    Provides all features of the restricted SCC, but allows users to run with any non-root UID. The user must specify the UID or it must be specified in the manifest of the container runtime.

    privileged

    Allows access to all privileged and host features and the ability to run as any user, any group, any FSGroup, and with any SELinux context.

    This is the most relaxed SCC and should be used only for cluster administration. Grant with caution.

    The privileged SCC allows:

    • Users to run privileged pods

    • Pods to mount host directories as volumes

    • Pods to run as any user

    • Pods to run with any MCS label

    • Pods to use the host’s IPC namespace

    • Pods to use the host’s PID namespace

    • Pods to use any FSGroup

    • Pods to use any supplemental group

    • Pods to use any seccomp profiles

    • Pods to request any capabilities

    Setting privileged: true in the pod specification does not select the privileged SCC. Setting privileged: true in the pod specification matches on the allowPrivilegedContainer field of an SCC.

    restricted

    Denies access to all host features and requires pods to be run with a UID, and SELinux context that are allocated to the namespace. This is the most restrictive SCC and it is used by default for authenticated users.

    The restricted SCC:

    • Ensures that pods cannot run as privileged

    • Ensures that pods cannot mount host directory volumes

    • Requires that a pod is run as a user in a pre-allocated range of UIDs

    • Requires that a pod is run with a pre-allocated MCS label

    • Allows pods to use any FSGroup

    • Allows pods to use any supplemental group

    Security context constraints settings

    Security context constraints (SCCs) are composed of settings and strategies that control the security features a pod has access to. These settings fall into three categories:

    • CHOWN

    • DAC_OVERRIDE

    • FSETID

    • FOWNER

    • SETGID

    • SETUID

    • SETPCAP

    • NET_BIND_SERVICE

    • KILL

    The containers use the capabilities from this default list, but pod manifest authors can alter it by requesting additional capabilities or removing some of the default behaviors. Use the allowedCapabilities, defaultAddCapabilities, and requiredDropCapabilities parameters to control such requests from the pods and to dictate which capabilities can be requested, which ones must be added to each container, and which ones must be forbidden.

    Security context constraints strategies

    RunAsUser

    • MustRunAs - Requires a runAsUser to be configured. Uses the configured runAsUser as the default. Validates against the configured runAsUser.

    • MustRunAsRange - Requires minimum and maximum values to be defined if not using pre-allocated values. Uses the minimum as the default. Validates against the entire allowable range.

    • MustRunAsNonRoot - Requires that the pod be submitted with a non-zero runAsUser or have the USER directive defined in the image. No default provided.

    • RunAsAny - No default provided. Allows any runAsUser to be specified.

    SELinuxContext

    • MustRunAs - Requires seLinuxOptions to be configured if not using pre-allocated values. Uses seLinuxOptions as the default. Validates against seLinuxOptions.

    • RunAsAny - No default provided. Allows any seLinuxOptions to be specified.

    SupplementalGroups

    • MustRunAs - Requires at least one range to be specified if not using pre-allocated values. Uses the minimum value of the first range as the default. Validates against all ranges.

    • RunAsAny - No default provided. Allows any supplementalGroups to be specified.

    FSGroup

    • MustRunAs - Requires at least one range to be specified if not using pre-allocated values. Uses the minimum value of the first range as the default. Validates against the first ID in the first range.

    • RunAsAny - No default provided. Allows any fsGroup ID to be specified.

    The usage of specific volume types can be controlled by setting the volumes field of the SCC. The allowable values of this field correspond to the volume sources that are defined when creating a volume:

    The recommended minimum set of allowed volumes for new SCCs are configMap, downwardAPI, emptyDir, , secret, and projected.

    This list of allowable volume types is not exhaustive because new types are added with each release of OKD.

    For backwards compatibility, the usage of allowHostDirVolumePlugin overrides settings in the volumes field. For example, if allowHostDirVolumePlugin is set to false but allowed in the volumes field, then the hostPath value will be removed from volumes.

    Admission control

    Admission control with SCCs allows for control over the creation of resources based on the capabilities granted to a user.

    In terms of the SCCs, this means that an admission controller can inspect the user information made available in the context to retrieve an appropriate set of SCCs. Doing so ensures the pod is authorized to make requests about its operating environment or to generate a set of constraints to apply to the pod.

    The set of SCCs that admission uses to authorize a pod are determined by the user identity and groups that the user belongs to. Additionally, if the pod specifies a service account, the set of allowable SCCs includes any constraints accessible to the service account.

    Admission uses the following approach to create the final security context for the pod:

    1. Retrieve all SCCs available for use.

    2. Generate field values for security context settings that were not specified on the request.

    3. Validate the final settings against the available constraints.

    A pod must validate every field against the SCC. The following are examples for just two of the fields that must be validated:

    These examples are in the context of a strategy using the pre-allocated values.

    An FSGroup SCC strategy of MustRunAs

    If the pod defines a fsGroup ID, then that ID must equal the default fsGroup ID. Otherwise, the pod is not validated by that SCC and the next SCC is evaluated.

    If the SecurityContextConstraints.fsGroup field has value RunAsAny and the pod specification omits the Pod.spec.securityContext.fsGroup, then this field is considered valid. Note that it is possible that during validation, other SCC settings will reject other pod fields and thus cause the pod to fail.

    A SupplementalGroups SCC strategy of MustRunAs

    If the pod specification defines one or more supplementalGroups IDs, then the pod’s IDs must equal one of the IDs in the namespace’s openshift.io/sa.scc.supplemental-groups annotation. Otherwise, the pod is not validated by that SCC and the next SCC is evaluated.

    If the SecurityContextConstraints.supplementalGroups field has value RunAsAny and the pod specification omits the Pod.spec.securityContext.supplementalGroups, then this field is considered valid. Note that it is possible that during validation, other SCC settings will reject other pod fields and thus cause the pod to fail.

    Security context constraints prioritization

    Security context constraints (SCCs) have a priority field that affects the ordering when attempting to validate a request by the admission controller. A higher priority SCC is moved to the front of the set when sorting. When the complete set of available SCCs are determined they are ordered by:

    1. Highest priority first, nil is considered a 0 priority

    2. If priorities are equal, the SCCs will be sorted from most restrictive to least restrictive

    3. If both priorities and restrictions are equal the SCCs will be sorted by name

    By default, the anyuid SCC granted to cluster administrators is given priority in their SCC set. This allows cluster administrators to run pods as any user by without specifying a RunAsUser on the pod’s SecurityContext. The administrator may still specify a RunAsUser if they wish.

    About pre-allocated security context constraints values

    The admission controller is aware of certain conditions in the security context constraints (SCCs) that trigger it to look up pre-allocated values from a namespace and populate the SCC before processing the pod. Each SCC strategy is evaluated independently of other strategies, with the pre-allocated values, where allowed, for each policy aggregated with pod specification values to make the final values for the various IDs defined in the running pod.

    The following SCCs cause the admission controller to look for pre-allocated values when no ranges are defined in the pod specification:

    1. A RunAsUser strategy of MustRunAsRange with no minimum or maximum set. Admission looks for the openshift.io/sa.scc.uid-range annotation to populate range fields.

    2. An SELinuxContext strategy of MustRunAs with no level set. Admission looks for the openshift.io/sa.scc.mcs annotation to populate the level.

    3. A FSGroup strategy of MustRunAs. Admission looks for the openshift.io/sa.scc.supplemental-groups annotation.

    4. A SupplementalGroups strategy of MustRunAs. Admission looks for the openshift.io/sa.scc.supplemental-groups annotation.

    During the generation phase, the security context provider uses default values for any parameter values that are not specifically set in the pod. Default values are based on the selected strategy:

    1. RunAsAny and MustRunAsNonRoot strategies do not provide default values. If the pod needs a parameter value, such as a group ID, you must define the value in the pod specification.

    2. MustRunAs (single value) strategies provide a default value that is always used. For example, for group IDs, even if the pod specification defines its own ID value, the namespace’s default parameter value also appears in the pod’s groups.

    3. MustRunAsRange and MustRunAs (range-based) strategies provide the minimum value of the range. As with a single value MustRunAs strategy, the namespace’s default parameter value appears in the running pod. If a range-based strategy is configurable with multiple ranges, it provides the minimum value of the first configured range.

    FSGroup and SupplementalGroups strategies fall back to the openshift.io/sa.scc.uid-range annotation if the openshift.io/sa.scc.supplemental-groups annotation does not exist on the namespace. If neither exists, the SCC is not created.

    By default, the annotation-based FSGroup strategy configures itself with a single range based on the minimum value for the annotation. For example, if your annotation reads 1/3, the FSGroup strategy configures itself with a minimum and maximum value of 1. If you want to allow more groups to be accepted for the FSGroup field, you can configure a custom SCC that does not use the annotation.

    The openshift.io/sa.scc.supplemental-groups annotation accepts a comma-delimited list of blocks in the format of <start>/<length or <start>-<end>. The openshift.io/sa.scc.uid-range annotation accepts only a single block.

    The following examples show the security context constraints (SCC) format and annotations:

    Annotated priviledged SCC

    1A list of capabilities that a pod can request. An empty list means that none of capabilities can be requested while the special symbol * allows any capabilities.
    2A list of additional capabilities that are added to any pod.
    3The FSGroup strategy, which dictates the allowable values for the security context.
    4The groups that can access this SCC.
    5A list of capabilities that are be dropped from a pod.
    6The runAsUser strategy type, which dictates the allowable values for the Security Context.
    7The seLinuxContext strategy type, which dictates the allowable values for the Security Context.
    8The supplementalGroups strategy, which dictates the allowable supplemental groups for the Security Context.
    9The users who can access this SCC.

    The users and groups fields on the SCC control which users can access the SCC. By default, cluster administrators, nodes, and the build controller are granted access to the privileged SCC. All authenticated users are granted access to the restricted SCC.

    Without explicit runAsUser setting

    1. apiVersion: v1
    2. kind: Pod
    3. metadata:
    4. name: security-context-demo
    5. spec:
    6. securityContext: (1)
    7. containers:
    8. - name: sec-ctx-demo
    9. image: gcr.io/google-samples/node-hello:1.0
    1When a container or pod does not request a user ID under which it should be run, the effective UID depends on the SCC that emits this pod. Because restricted SCC is granted to all authenticated users by default, it will be available to all users and service accounts and used in most cases. The restricted SCC uses MustRunAsRange strategy for constraining and defaulting the possible values of the securityContext.runAsUser field. The admission plug-in will look for the openshift.io/sa.scc.uid-range annotation on the current project to populate range fields, as it does not provide this range. In the end, a container will have runAsUser equal to the first value of the range that is hard to predict because every project has different ranges.

    With explicit runAsUser setting

    1. apiVersion: v1
    2. kind: Pod
    3. metadata:
    4. name: security-context-demo
    5. spec:
    6. securityContext:
    7. runAsUser: 1000 (1)
    8. containers:
    9. - name: sec-ctx-demo
    10. image: gcr.io/google-samples/node-hello:1.0

    This configuration is valid for SELinux, fsGroup, and Supplemental Groups.

    Creating security context constraints

    You can create security context constraints (SCCs) by using the OpenShift CLI (oc).

    Prerequisites

    • Install the OpenShift CLI ().

    • Log in to the cluster as a user with the cluster-admin role.

    Procedure

    1. Define the SCC in a YAML file named scc_admin.yaml:

      SecurityContextConstraints object definition

      1. kind: SecurityContextConstraints
      2. apiVersion: security.openshift.io/v1
      3. metadata:
      4. allowPrivilegedContainer: true
      5. runAsUser:
      6. type: RunAsAny
      7. seLinuxContext:
      8. type: RunAsAny
      9. fsGroup:
      10. type: RunAsAny
      11. supplementalGroups:
      12. type: RunAsAny
      13. users:
      14. - my-admin-user
      15. groups:
      16. - my-admin-group

      Optionally, you can specify drop capabilities for an SCC by setting the requiredDropCapabilities field with the desired values. Any specified capabilities are dropped from the container. For example, to create an SCC with the KILL, MKNOD, and SYS_CHROOT required drop capabilities, add the following to the SCC object:

      1. requiredDropCapabilities:
      2. - KILL
      3. - MKNOD
      4. - SYS_CHROOT

      CRI-O supports the same list of capability values that are found in the .

    2. Create the SCC by passing in the file:

      Example output

      1. securitycontextconstraints "scc-admin" created

    Verification

    • Verify that the SCC was created:

      1. $ oc get scc scc-admin

      Example output

      1. NAME PRIV CAPS SELINUX RUNASUSER FSGROUP SUPGROUP PRIORITY READONLYROOTFS VOLUMES
      2. scc-admin true [] RunAsAny RunAsAny RunAsAny RunAsAny <none> false [awsElasticBlockStore azureDisk azureFile cephFS cinder configMap downwardAPI emptyDir fc flexVolume flocker gcePersistentDisk gitRepo glusterfs iscsi nfs persistentVolumeClaim photonPersistentDisk quobyte rbd secret vsphere]

    You can specify SCCs as resources that are handled by RBAC. This allows you to scope access to your SCCs to a certain project or to the entire cluster. Assigning users, groups, or service accounts directly to an SCC retains cluster-wide scope.

    You cannot assign a SCC to pods created in one of the default namespaces: default, kube-system, kube-public, openshift-node, openshift-infra, openshift. These namespaces should not be used for running pods or services.

    To include access to SCCs for your role, specify the scc resource when creating a role.

    1. $ oc create role <role-name> --verb=use --resource=scc --resource-name=<scc-name> -n <namespace>

    This results in the following role definition:

    1The role’s name.
    2Namespace of the defined role. Defaults to default if not specified.
    3The API group that includes the SecurityContextConstraints resource. Automatically defined when scc is specified as a resource.
    4An example name for an SCC you want to have access.
    5Name of the resource group that allows users to specify SCC names in the resourceNames field.
    6A list of verbs to apply to the role.

    A local or cluster role with such a rule allows the subjects that are bound to it with a role binding or a cluster role binding to use the user-defined SCC called scc-name.

    Because RBAC is designed to prevent escalation, even project administrators are unable to grant access to an SCC. By default, they are not allowed to use the verb use on SCC resources, including the restricted SCC.

    Reference of security context constraints commands

    You can manage security context constraints (SCCs) in your instance as normal API objects using the OpenShift CLI (oc).

    You must have cluster-admin privileges to manage SCCs.

    To get a current list of SCCs:

    1. $ oc get scc

    Example output

    1. NAME PRIV CAPS SELINUX RUNASUSER FSGROUP SUPGROUP PRIORITY READONLYROOTFS VOLUMES
    2. anyuid false [] MustRunAs RunAsAny RunAsAny RunAsAny 10 false [configMap downwardAPI emptyDir persistentVolumeClaim projected secret]
    3. hostaccess false [] MustRunAs MustRunAsRange MustRunAs RunAsAny <none> false [configMap downwardAPI emptyDir hostPath persistentVolumeClaim projected secret]
    4. hostmount-anyuid false [] MustRunAs RunAsAny RunAsAny RunAsAny <none> false [configMap downwardAPI emptyDir hostPath nfs persistentVolumeClaim projected secret]
    5. hostnetwork false [] MustRunAs MustRunAsRange MustRunAs MustRunAs <none> false [configMap downwardAPI emptyDir persistentVolumeClaim projected secret]
    6. node-exporter false [] RunAsAny RunAsAny RunAsAny RunAsAny <none> false [*]
    7. nonroot false [] MustRunAs MustRunAsNonRoot RunAsAny RunAsAny <none> false [configMap downwardAPI emptyDir persistentVolumeClaim projected secret]
    8. privileged true [*] RunAsAny RunAsAny RunAsAny RunAsAny <none> false [*]
    9. restricted false [] MustRunAs MustRunAsRange MustRunAs RunAsAny <none> false [configMap downwardAPI emptyDir persistentVolumeClaim projected secret]

    Examining security context constraints

    You can view information about a particular SCC, including which users, service accounts, and groups the SCC is applied to.

    For example, to examine the restricted SCC:

    1. $ oc describe scc restricted

    Example output

    1. Name: restricted
    2. Priority: <none>
    3. Access:
    4. Users: <none> (1)
    5. Groups: system:authenticated (2)
    6. Settings:
    7. Allow Privileged: false
    8. Default Add Capabilities: <none>
    9. Required Drop Capabilities: KILL,MKNOD,SYS_CHROOT,SETUID,SETGID
    10. Allowed Capabilities: <none>
    11. Allowed Seccomp Profiles: <none>
    12. Allowed Volume Types: configMap,downwardAPI,emptyDir,persistentVolumeClaim,projected,secret
    13. Allow Host Network: false
    14. Allow Host Ports: false
    15. Allow Host PID: false
    16. Allow Host IPC: false
    17. Read Only Root Filesystem: false
    18. Run As User Strategy: MustRunAsRange
    19. UID: <none>
    20. UID Range Min: <none>
    21. UID Range Max: <none>
    22. SELinux Context Strategy: MustRunAs
    23. User: <none>
    24. Role: <none>
    25. Type: <none>
    26. Level: <none>
    27. FSGroup Strategy: MustRunAs
    28. Ranges: <none>
    29. Supplemental Groups Strategy: RunAsAny
    1Lists which users and service accounts the SCC is applied to.
    2Lists which groups the SCC is applied to.

    To preserve customized SCCs during upgrades, do not edit settings on the default SCCs.

    Deleting security context constraints

    To delete an SCC:

    If you delete a default SCC, it will regenerate when you restart the cluster.

    To update an existing SCC:

      To preserve customized SCCs during upgrades, do not edit settings on the default SCCs.