add authz limitation of server-first TCP protocol (#10435)

* add authz limitation

* Apply suggestions from code review

Co-authored-by: Eric Van Norman <ericvn@us.ibm.com>

Co-authored-by: Eric Van Norman <ericvn@us.ibm.com>
This commit is contained in:
Yangmin Zhu 2021-10-21 11:36:53 -07:00 committed by GitHub
parent 3d2cd6adf9
commit 61428d72a3
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 22 additions and 0 deletions

View File

@ -355,6 +355,28 @@ issue might be considered a security vulnerability that needs to be fixed in pri
If the Istio Product Security Work Group evaluates the feature request as not a security vulnerability, an issue will
be opened in public for further discussions of the feature request.
### Known limitations
This section lists known limitations of the authorization policy.
#### Server-first TCP protocols are not supported
Server-first TCP protocols mean the server application will send the first bytes right after accepting the TCP connection
before receiving any data from the client.
Currently, the authorization policy only supports enforcing access control on inbound traffic and not the outbound traffic.
It also does not support server-first TCP protocols because the first bytes are sent by the server application even before
it received any data from the client. In this case, the initial first bytes sent by the server are returned to the client
directly without going through the access control check of the authorization policy.
You should not use the authorization policy if the first bytes sent by the server-first TCP protocols include any sensitive
data that need to be protected by proper authorization.
You could still use the authorization policy in this case if the first bytes does not include any sensitive data, for example,
the first bytes are used for negotiating the connection with data that are publicly accessible to any clients. The authorization
policy will work as usual for the following requests sent by the client after the first bytes.
## Understand traffic capture limitations
The Istio sidecar works by capturing both inbound traffic and outbound traffic and directing them through the sidecar proxy.