mirror of https://github.com/istio/istio.io.git
139 lines
28 KiB
HTML
139 lines
28 KiB
HTML
<!doctype html><html lang=en itemscope itemtype=https://schema.org/WebPage><head><meta charset=utf-8><meta http-equiv=X-UA-Compatible content="IE=edge"><meta name=viewport content="width=device-width,initial-scale=1,shrink-to-fit=no"><meta name=theme-color content="#466BB0"><meta name=title content="Announcing the results of Istio’s first security assessment"><meta name=description content="Results of a third-party security review by NCC Group."><meta name=author content="Neeraj Poddar (Aspen Mesh), on behalf of Istio Product Security Working Group"><meta name=keywords content="microservices,services,mesh,istio,security,audit,ncc,assessment"><meta property="og:title" content="Announcing the results of Istio’s first security assessment"><meta property="og:type" content="website"><meta property="og:description" content="Results of a third-party security review by NCC Group."><meta property="og:url" content="/v1.21/blog/2021/ncc-security-assessment/"><meta property="og:image" content="https://raw.githubusercontent.com/istio/istio.io/master/static/img/istio-social.png"><meta property="og:image:alt" content="The Istio sailboat logo"><meta property="og:image:width" content="4096"><meta property="og:image:height" content="2048"><meta property="og:site_name" content="Istio"><meta name=twitter:card content="summary_large_image"><meta name=twitter:site content="@IstioMesh"><title>Istioldie 1.21 / Announcing the results of Istio’s first security assessment</title>
|
||
<script async src="https://www.googletagmanager.com/gtag/js?id=UA-98480406-2"></script><script>window.dataLayer=window.dataLayer||[];function gtag(){dataLayer.push(arguments)}gtag("js",new Date),gtag("config","UA-98480406-2")</script><link rel=alternate type=application/rss+xml title="Istio Blog" href=/v1.21/blog/feed.xml><link rel=alternate type=application/rss+xml title="Istio News" href=/v1.21/news/feed.xml><link rel=alternate type=application/rss+xml title="Istio Blog and News" href=/v1.21/feed.xml><link rel="shortcut icon" href=/v1.21/favicons/favicon.ico><link rel=apple-touch-icon href=/v1.21/favicons/apple-touch-icon-180x180.png sizes=180x180><link rel=icon type=image/png href=/v1.21/favicons/favicon-16x16.png sizes=16x16><link rel=icon type=image/png href=/v1.21/favicons/favicon-32x32.png sizes=32x32><link rel=icon type=image/png href=/v1.21/favicons/android-36x36.png sizes=36x36><link rel=icon type=image/png href=/v1.21/favicons/android-48x48.png sizes=48x48><link rel=icon type=image/png href=/v1.21/favicons/android-72x72.png sizes=72x72><link rel=icon type=image/png href=/v1.21/favicons/android-96x96.png sizes=96xW96><link rel=icon type=image/png href=/v1.21/favicons/android-144x144.png sizes=144x144><link rel=icon type=image/png href=/v1.21/favicons/android-192x192.png sizes=192x192><link rel=icon type=image/svg+xml href=/v1.21/favicons/favicon.svg><link rel=icon type=image/png href=/v1.21/favicons/favicon.png><link rel=mask-icon href=/v1.21/favicons/safari-pinned-tab.svg color=#466BB0><link rel=manifest href=/v1.21/manifest.json><meta name=apple-mobile-web-app-title content="Istio"><meta name=application-name content="Istio"><meta name=msapplication-config content="/browserconfig.xml"><meta name=msapplication-TileColor content="#466BB0"><meta name=theme-color content="#466BB0"><link rel=stylesheet href=/v1.21/css/all.css><link rel=preconnect href=https://fonts.googleapis.com><link rel=preconnect href=https://fonts.gstatic.com crossorigin><link rel=stylesheet href="https://fonts.googleapis.com/css2?family=Barlow:ital,wght@0,400;0,500;0,600;0,700;1,400;1,600&display=swap"><script src=/v1.21/js/themes_init.min.js></script></head><body class="language-unknown archive-site"><script>const branchName="release-1.21",docTitle="Announcing the results of Istio’s first security assessment",iconFile="/v1.21//img/icons.svg",buttonCopy="Copy to clipboard",buttonPrint="Print",buttonDownload="Download"</script><script src="https://www.google.com/cse/brand?form=search-form" defer></script><script src=/v1.21/js/all.min.js data-manual defer></script><header class=main-navigation><nav class="main-navigation-wrapper container-l"><div class=main-navigation-header><a id=brand href=/v1.21/ aria-label=logotype><span class=logo><svg xmlns="http://www.w3.org/2000/svg" width="128" height="60" viewBox="0 0 128 60"><path d="M58.434 48.823A.441.441.0 0158.3 48.497V22.583a.444.444.0 01.134-.326.446.446.0 01.327-.134h3.527a.447.447.0 01.325.134.447.447.0 01.134.326v25.914a.443.443.0 01-.134.326.444.444.0 01-.325.134h-3.527a.444.444.0 01-.327-.134z"/><path d="m70.969 48.477a6.556 6.556.0 01-2.818-1.955 4.338 4.338.0 01-1-2.78v-.345a.443.443.0 01.134-.326.444.444.0 01.326-.135h3.374a.444.444.0 01.326.135.445.445.0 01.134.326v.077a2.014 2.014.0 001.054 1.667 4.672 4.672.0 002.664.709 4.446 4.446.0 002.492-.633 1.862 1.862.0 00.958-1.591 1.426 1.426.0 00-.786-1.322 12.7 12.7.0 00-2.549-.939l-1.457-.46a21.526 21.526.0 01-3.3-1.227 6.57 6.57.0 01-2.262-1.783 4.435 4.435.0 01-.92-2.894 5.081 5.081.0 012.109-4.275 8.993 8.993.0 015.558-1.591 10.445 10.445.0 014.1.748 6.3 6.3.0 012.722 2.07 5 5 0 01.958 3.009.441.441.0 01-.134.326.441.441.0 01-.325.134h-3.258a.441.441.0 01-.326-.134.443.443.0 01-.134-.326 1.974 1.974.0 00-.978-1.667 4.647 4.647.0 00-2.665-.671 4.741 4.741.0 00-2.435.556 1.724 1.724.0 00-.938 1.553 1.512 1.512.0 00.9 1.4 15.875 15.875.0 003.01 1.055l.843.229a27.368 27.368.0 013.412 1.246 6.67 6.67.0 012.338 1.763 4.387 4.387.0 01.958 2.933 4.988 4.988.0 01-2.146 4.275 9.543 9.543.0 01-5.712 1.552 11.626 11.626.0 01-4.227-.709z"/><path d="m97.039 32.837a.443.443.0 01-.326.135h-3.911a.169.169.0 00-.191.192v9.239a2.951 2.951.0 00.632 2.108 2.7 2.7.0 002.013.652h1.15a.444.444.0 01.325.134.441.441.0 01.134.326v2.875a.471.471.0 01-.459.5l-1.994.039a8 8 0 01-4.524-1.035q-1.495-1.035-1.533-3.91V33.166A.17.17.0 0088.164 32.974H85.978A.441.441.0 0185.652 32.839.441.441.0 0185.518 32.513V29.83a.441.441.0 01.134-.326.444.444.0 01.326-.135h2.186a.169.169.0 00.191-.192v-4.485a.438.438.0 01.134-.326.44.44.0 01.325-.134h3.336a.443.443.0 01.325.134.442.442.0 01.135.326v4.485a.169.169.0 00.191.192h3.911a.446.446.0 01.326.135.446.446.0 01.134.326v2.683a.446.446.0 01-.133.324z"/><path d="m101.694 25.917a2.645 2.645.0 01-.767-1.955 2.65 2.65.0 01.767-1.955 2.65 2.65.0 011.955-.767 2.65 2.65.0 011.955.767 2.652 2.652.0 01.767 1.955 2.647 2.647.0 01-.767 1.955 2.646 2.646.0 01-1.955.767 2.645 2.645.0 01-1.955-.767zm-.211 22.906a.441.441.0 01-.134-.326V29.79a.444.444.0 01.134-.326.446.446.0 01.326-.134h3.527a.446.446.0 01.326.134.445.445.0 01.134.326v18.707a.443.443.0 01-.134.326.443.443.0 01-.326.134h-3.527a.443.443.0 01-.326-.134z"/><path d="m114.019 47.734a8.1 8.1.0 01-3.047-4.255 14.439 14.439.0 01-.652-4.37 14.3 14.3.0 01.614-4.371A7.869 7.869.0 01114 30.56a9.072 9.072.0 015.252-1.5 8.543 8.543.0 015.041 1.5 7.985 7.985.0 013.009 4.14 12.439 12.439.0 01.69 4.37 13.793 13.793.0 01-.651 4.37 8.255 8.255.0 01-3.028 4.275 8.475 8.475.0 01-5.1 1.553 8.754 8.754.0 01-5.194-1.534zm7.629-3.1a4.536 4.536.0 001.476-2.262 11.335 11.335.0 00.383-3.221 10.618 10.618.0 00-.383-3.22 4.169 4.169.0 00-1.457-2.243 4.066 4.066.0 00-2.531-.785 3.942 3.942.0 00-2.453.785 4.376 4.376.0 00-1.5 2.243 11.839 11.839.0 00-.383 3.22 11.84 11.84.0 00.383 3.221 4.222 4.222.0 001.476 2.262 4.075 4.075.0 002.549.8 3.8 3.8.0 002.44-.809z"/><path d="m15.105 32.057v15.565a.059.059.0 01-.049.059L.069 50.25A.06.06.0 01.005 50.167l14.987-33.47a.06.06.0 01.114.025z"/><path d="m17.631 23.087v24.6a.06.06.0 00.053.059l22.449 2.507a.06.06.0 00.061-.084L17.745.032a.06.06.0 00-.114.024z"/><path d="m39.961 52.548-24.833 7.45a.062.062.0 01-.043.0L.079 52.548a.059.059.0 01.026-.113h39.839a.06.06.0 01.017.113z"/></svg></span>
|
||
</a><button id=hamburger class=main-navigation-toggle aria-label="Open navigation">
|
||
<svg class="icon menu-hamburger"><use xlink:href="/v1.21/img/icons.svg#menu-hamburger"/></svg>
|
||
</button>
|
||
<button id=menu-close class=main-navigation-toggle aria-label="Close navigation"><svg class="icon menu-close"><use xlink:href="/v1.21/img/icons.svg#menu-close"/></svg></button></div><div id=header-links class=main-navigation-links-wrapper><ul class=main-navigation-links><li class=main-navigation-links-item><a class="main-navigation-links-link has-dropdown"><span>About</span><svg class="icon dropdown-arrow"><use xlink:href="/v1.21/img/icons.svg#dropdown-arrow"/></svg></a><ul class=main-navigation-links-dropdown><li class=main-navigation-links-dropdown-item><a href=/v1.21/about/service-mesh class=main-navigation-links-link>Service mesh</a></li><li class=main-navigation-links-dropdown-item><a href=/v1.21/about/solutions class=main-navigation-links-link>Solutions</a></li><li class=main-navigation-links-dropdown-item><a href=/v1.21/about/case-studies class=main-navigation-links-link>Case studies</a></li><li class=main-navigation-links-dropdown-item><a href=/v1.21/about/ecosystem class=main-navigation-links-link>Ecosystem</a></li><li class=main-navigation-links-dropdown-item><a href=/v1.21/about/deployment class=main-navigation-links-link>Deployment</a></li><li class=main-navigation-links-dropdown-item><a href=/v1.21/about/faq class=main-navigation-links-link>FAQ</a></li></ul></li><li class=main-navigation-links-item><a href=/v1.21/blog/ class=main-navigation-links-link><span>Blog</span></a></li><li class=main-navigation-links-item><a href=/v1.21/news/ class=main-navigation-links-link><span>News</span></a></li><li class=main-navigation-links-item><a href=/v1.21/get-involved/ class=main-navigation-links-link><span>Get involved</span></a></li><li class=main-navigation-links-item><a href=/v1.21/docs/ class=main-navigation-links-link><span>Documentation</span></a></li></ul><div class=main-navigation-footer><button id=search-show class=search-show title='Search this site' aria-label=Search><svg class="icon magnifier"><use xlink:href="/v1.21/img/icons.svg#magnifier"/></svg></button>
|
||
<a href=/v1.21/docs/setup/getting-started class="btn btn--primary" id=try-istio>Try Istio</a></div></div><form id=search-form class=search name=cse role=search><input type=hidden name=cx value=002184991200833970123:iwwf17ikgf4>
|
||
<input type=hidden name=ie value=utf-8>
|
||
<input type=hidden name=hl value=en>
|
||
<input type=hidden id=search-page-url value=/search>
|
||
<input id=search-textbox class="search-textbox form-control" name=q type=search aria-label='Search this site' placeholder=Search>
|
||
<button id=search-close title='Cancel search' type=reset aria-label='Cancel search'><svg class="icon menu-close"><use xlink:href="/v1.21/img/icons.svg#menu-close"/></svg></button></form></nav></header><div class=banner-container></div><article class=post itemscope itemtype=http://schema.org/BlogPosting><div class=header-content><h1>Announcing the results of Istio’s first security assessment</h1><p>Results of a third-party security review by NCC Group.</p></div><p class=post-author>Jul 13, 2021 <span>| </span>By Neeraj Poddar - Aspen Mesh, on behalf of Istio Product Security Working Group</p><div><p>The Istio service mesh has gained wide production adoption across a wide variety of
|
||
industries. The success of the project, and its critical usage for enforcing key
|
||
security policies in infrastructure warranted an open and neutral assessment of
|
||
the security risks associated with the project.</p><p>To achieve this goal, the Istio community contracted the
|
||
<a href=https://www.nccgroup.com/>NCC Group</a> last year to
|
||
conduct a third-party security assessment of the project. The goal of the review
|
||
was “to identify security issues related to the Istio code base, highlight
|
||
high-risk configurations commonly used by administrators, and provide
|
||
perspective on whether security features sufficiently address the concerns they
|
||
are designed to provide”.</p><p>NCC Group carried out the review over a period of five weeks with collaboration
|
||
from subject matter experts across the Istio community. In this blog, we will
|
||
examine the key findings of the report, actions taken to implement various fixes
|
||
and recommendations, and our plan of action for continuous security evaluation
|
||
and improvement of the Istio project. You can download and read the
|
||
unabridged version of the
|
||
<a href=./NCC_Group_Google_GOIST2005_Report_2020-08-06_v1.1.pdf>security assessment report</a>.</p><h2 id=scope-and-key-findings>Scope and Key Findings</h2><p>The assessment evaluated Istio’s architecture as a whole for security related
|
||
issues with focus on key components like istiod (Pilot), Ingress/Egress
|
||
gateways, and Istio’s overall Envoy usage as its data plane proxy. Additionally,
|
||
Istio documentation, including security guides, were audited for correctness and
|
||
clarity. The report was compiled against Istio version 1.6.5, and since then the
|
||
Product Security Working Group has issued several security releases as new
|
||
vulnerabilities were disclosed, along with fixes to address concerns raised in
|
||
the new report.</p><p>An important conclusion from the report is that the auditors found no “Critical”
|
||
issues within the Istio project. This finding validates the continuous and
|
||
proactive security review and vulnerability management process implemented by
|
||
Istio’s Product Security Working Group (PSWG). For the remaining issues surfaced
|
||
by the report, the PSWG went to work on addressing them, and we are glad to
|
||
report that all issues marked “High”, and several marked “Medium/Low”, have been
|
||
resolved in the releases following the report.</p><p>The report also makes strategic recommendations around creating a hardening
|
||
guide which is now available in our
|
||
<a href=/v1.21/docs/ops/best-practices/security/>Security Best Practices</a>
|
||
guide. This is a comprehensive document which pulls together recommendations
|
||
from security experts within the Istio community, and industry leaders running
|
||
Istio in production. Work is underway to create an opinionated and hardened
|
||
security profile for installing Istio in secure environments, but in the interim
|
||
we recommend users follow the Security Best Practices guide and configure Istio
|
||
to meet their security requirements. With that, let’s look at the analysis and
|
||
resolution for various issues raised in the report.</p><h2 id=resolution-and-learnings>Resolution and learnings</h2><h3 id=inability-to-secure-control-plane-network-communications>Inability to secure control plane network communications</h3><p>The report flags configuration options that were available in older versions of
|
||
Istio to control how communication is secured to the control plane. Since 1.7,
|
||
Istio by default secures all control plane communication and many configuration
|
||
options mentioned in the report to manage control plane encryption are no longer
|
||
required.</p><p>The debug endpoint mentioned in the report is enabled by default (as of Istio
|
||
1.10) to allow users to debug their Istio service mesh using the <code>istioctl</code> tool.
|
||
It can be disabled by setting the environment variable <code>ENABLE_DEBUG_ON_HTTP</code> to
|
||
false as mentioned in the <a href=/v1.21/docs/ops/best-practices/security/#control-plane>Security Best
|
||
Practices</a>
|
||
guide. Additionally, in an upcoming version (1.11), this debug endpoint will
|
||
be secured by default and a valid Kubernetes service account token will be
|
||
required to gain access.</p><h3 id=lack-of-security-related-documentation>Lack of security related documentation</h3><p>The report points out gaps in the security related documentation published with
|
||
Istio 1.6. Since then, we have created a detailed <a href=/v1.21/docs/ops/best-practices/security/>Security Best Practices</a>
|
||
guide with recommendations to ensure users can deploy Istio securely to meet
|
||
their requirements. Moving forward, we will continue to augment this
|
||
documentation with more hardening recommendations. We advise users to monitor
|
||
the guide for updates.</p><h3 id=lack-of-virtualservice-gateway-field-validation-enables-request-hijacking>Lack of VirtualService Gateway field validation enables request hijacking</h3><p>For this issue, the report uses a valid but permissive Gateway configuration
|
||
that can cause requests to be routed incorrectly. Similar to the Kubernetes
|
||
RBAC, Istio APIs, including Gateways, can be tuned to be permissive or
|
||
restrictive depending upon your requirements. However, the report surfaced
|
||
missing links in our documentation related to best practices and guiding our
|
||
users to secure their environments. To address them, we have added a section to
|
||
our Security Best Practices guide with steps for running
|
||
<a href=/v1.21/docs/ops/best-practices/security/#gateways>Gateways</a> securely.
|
||
In particular, the section describing <a href=/v1.21/docs/ops/best-practices/security/#avoid-overly-broad-hosts-configurations>using namespace prefixes in hosts
|
||
specification</a>
|
||
on Gateway resources is strongly recommended to harden your
|
||
configuration and prevent this type of request hijacking.</p><h3 id=ingress-gateway-configuration-generation-enables-request-hijacking>Ingress Gateway configuration generation enables request hijacking</h3><p>The report raises possible request hijacking when using the default mechanism of
|
||
selecting gateway workloads by labels across namespaces in a Gateway resource.
|
||
This behavior was chosen by default as it allows delegation of managing Gateway
|
||
and VirtualService resources to the applications team while allowing operations
|
||
teams to centrally manage the ingress gateway workloads for meeting their unique
|
||
security requirements like running on dedicated nodes for instance. As
|
||
highlighted in the report, if this deployment topology is not a requirement in
|
||
your environment it is strongly recommended to co-locate Gateway resources with
|
||
your gateway workloads and set the environment variable
|
||
<code>PILOT_SCOPE_GATEWAY_TO_NAMESPACE</code> to true.</p><p>Please refer to the <a href=/v1.21/docs/setup/additional-setup/gateway/#gateway-deployment-topologies>gateway deployment topologies guide</a>
|
||
to understand the various recommended deployment models by the
|
||
Istio community. Additionally, as mentioned in the
|
||
<a href=/v1.21/docs/ops/best-practices/security/#restrict-gateway-creation-privileges>Security Best Practices</a>
|
||
guide, Gateway resource creation should be access controlled using Kubernetes
|
||
RBAC or other policy enforcement mechanisms to ensure only authorized entities
|
||
can create them.</p><h3 id=other-medium-and-low-severity-issues>Other Medium and Low Severity Issues</h3><p>There are two medium severity issues reported related to debug information
|
||
exposed at various levels within the project which can be used to gain access to
|
||
sensitive information or orchestrate Denial of Service (DOS) attacks. While
|
||
Istio by default enables these debug interfaces for profiling or enabling tools
|
||
like “istioctl”, they can be disabled by setting the environment variable
|
||
<code>ENABLE_DEBUG_ON_HTTP</code> to false as discussed above.</p><p>The report correctly points out that various utilities like <code>sudo</code>, <code>tcpdump</code>, etc.
|
||
installed in the default images shipped by Istio can lead to privilege
|
||
escalation attacks. These utilities are provided to aid runtime debugging of
|
||
packets flowing through the mesh, and users are recommended to use
|
||
<a href=/v1.21/docs/ops/configuration/security/harden-docker-images/>hardened versions</a>
|
||
of these images in production.</p><p>The report also surfaces a known architectural limitation with any sidecar
|
||
proxy-based service mesh implementation which uses <code>iptables</code> for intercepting
|
||
traffic. This mechanism is susceptible to
|
||
<a href=/v1.21/docs/ops/best-practices/security/#understand-traffic-capture-limitations>sidecar proxy bypass</a>,
|
||
which is a valid concern for secure environments. It can be addressed by following the
|
||
<a href=/v1.21/docs/ops/best-practices/security/#defense-in-depth-with-networkpolicy>defense-in-depth</a>
|
||
recommendation of the Security Best Practices guide. We are
|
||
also investigating more secure options in collaboration with the Kubernetes
|
||
community.</p><h2 id=the-tradeoff-between-useful-and-secure>The tradeoff between useful and secure</h2><p>You may have noticed a trend in the findings of the assessment and the
|
||
recommendations made to address them. Istio provides various configuration
|
||
options to create a more secure installation based on your requirement, and we
|
||
have introduced a comprehensive <a href=/v1.21/docs/ops/best-practices/security/>Security Best Practices</a>
|
||
guide for our users to follow. As Istio is widely adopted in production, it is
|
||
a tradeoff for us between switching to secure defaults and possible migration
|
||
issues for our existing users on upgrades. The Istio Product Security Working
|
||
Group evaluates each of these issues and creates a plan of action to enable
|
||
secure default on a case-by-case basis after giving our users a number of
|
||
releases to opt-in the secure configuration and migrate their workloads.</p><p>Lastly, there were several lessons for us during and after undergoing a neutral
|
||
security assessment. The primary one was to ensure our security practices are
|
||
robust to quickly respond to the findings, and more importantly making security
|
||
enhancements while maintaining our standards for upgrades without disruption.</p><p>To continue this endeavor, we are always looking for feedback and participation
|
||
in the Istio Product Security Working Group, so
|
||
<a href=https://github.com/istio/community/blob/master/WORKING-GROUPS.md>join our public meetings</a>
|
||
to raise issues or learn about what we are doing to keep Istio secure!</p></div><nav class=pagenav><div class=left><a title="Allowing for Less Frequent Upgrades." href=/v1.21/blog/2021/extended-support/ class=next-link><svg class="icon left-arrow"><use xlink:href="/v1.21/img/icons.svg#left-arrow"/></svg>Announcing Extended Support for Istio 1.9</a></div><div class=right><a title="The Chinese Istio community comes together in Beijing." href=/v1.21/blog/2021/istio-community-meetup-china/ class=next-link>Join us at the Istio Community Meetup in China<svg class="icon right-arrow"><use xlink:href="/v1.21/img/icons.svg#right-arrow"/></svg></a></div></nav></article><footer class=footer><div class="footer-wrapper container-l"><div class="user-links footer-links"><a class=channel title='GitHub is where development takes place on Istio code' href=https://github.com/istio/community aria-label=GitHub><svg class="icon github"><use xlink:href="/v1.21/img/icons.svg#github"/></svg>
|
||
</a><a class=channel title="Access our team drive if you'd like to take a look at the Istio technical design documents" href=https://groups.google.com/forum/#!forum/istio-team-drive-access aria-label="team drive"><svg class="icon drive"><use xlink:href="/v1.21/img/icons.svg#drive"/></svg>
|
||
</a><a class=channel title='Interactively discuss issues with the Istio community on Slack' href=https://slack.istio.io aria-label=slack><svg class="icon slack"><use xlink:href="/v1.21/img/icons.svg#slack"/></svg>
|
||
</a><a class=channel title='Stack Overflow is where you can ask questions and find curated answers on deploying, configuring, and using Istio' href=https://stackoverflow.com/questions/tagged/istio aria-label="Stack Overflow"><svg class="icon stackoverflow"><use xlink:href="/v1.21/img/icons.svg#stackoverflow"/></svg>
|
||
</a><a class=channel title='Follow us on Twitter to get the latest news' href=https://twitter.com/IstioMesh aria-label=Twitter><svg class="icon twitter"><use xlink:href="/v1.21/img/icons.svg#twitter"/></svg></a></div><hr class=footer-separator role=separator><div class="info footer-info"><a class=logo href=/v1.21/ aria-label=logotype><svg xmlns="http://www.w3.org/2000/svg" width="128" height="60" viewBox="0 0 128 60"><path d="M58.434 48.823A.441.441.0 0158.3 48.497V22.583a.444.444.0 01.134-.326.446.446.0 01.327-.134h3.527a.447.447.0 01.325.134.447.447.0 01.134.326v25.914a.443.443.0 01-.134.326.444.444.0 01-.325.134h-3.527a.444.444.0 01-.327-.134z"/><path d="m70.969 48.477a6.556 6.556.0 01-2.818-1.955 4.338 4.338.0 01-1-2.78v-.345a.443.443.0 01.134-.326.444.444.0 01.326-.135h3.374a.444.444.0 01.326.135.445.445.0 01.134.326v.077a2.014 2.014.0 001.054 1.667 4.672 4.672.0 002.664.709 4.446 4.446.0 002.492-.633 1.862 1.862.0 00.958-1.591 1.426 1.426.0 00-.786-1.322 12.7 12.7.0 00-2.549-.939l-1.457-.46a21.526 21.526.0 01-3.3-1.227 6.57 6.57.0 01-2.262-1.783 4.435 4.435.0 01-.92-2.894 5.081 5.081.0 012.109-4.275 8.993 8.993.0 015.558-1.591 10.445 10.445.0 014.1.748 6.3 6.3.0 012.722 2.07 5 5 0 01.958 3.009.441.441.0 01-.134.326.441.441.0 01-.325.134h-3.258a.441.441.0 01-.326-.134.443.443.0 01-.134-.326 1.974 1.974.0 00-.978-1.667 4.647 4.647.0 00-2.665-.671 4.741 4.741.0 00-2.435.556 1.724 1.724.0 00-.938 1.553 1.512 1.512.0 00.9 1.4 15.875 15.875.0 003.01 1.055l.843.229a27.368 27.368.0 013.412 1.246 6.67 6.67.0 012.338 1.763 4.387 4.387.0 01.958 2.933 4.988 4.988.0 01-2.146 4.275 9.543 9.543.0 01-5.712 1.552 11.626 11.626.0 01-4.227-.709z"/><path d="m97.039 32.837a.443.443.0 01-.326.135h-3.911a.169.169.0 00-.191.192v9.239a2.951 2.951.0 00.632 2.108 2.7 2.7.0 002.013.652h1.15a.444.444.0 01.325.134.441.441.0 01.134.326v2.875a.471.471.0 01-.459.5l-1.994.039a8 8 0 01-4.524-1.035q-1.495-1.035-1.533-3.91V33.166A.17.17.0 0088.164 32.974H85.978A.441.441.0 0185.652 32.839.441.441.0 0185.518 32.513V29.83a.441.441.0 01.134-.326.444.444.0 01.326-.135h2.186a.169.169.0 00.191-.192v-4.485a.438.438.0 01.134-.326.44.44.0 01.325-.134h3.336a.443.443.0 01.325.134.442.442.0 01.135.326v4.485a.169.169.0 00.191.192h3.911a.446.446.0 01.326.135.446.446.0 01.134.326v2.683a.446.446.0 01-.133.324z"/><path d="m101.694 25.917a2.645 2.645.0 01-.767-1.955 2.65 2.65.0 01.767-1.955 2.65 2.65.0 011.955-.767 2.65 2.65.0 011.955.767 2.652 2.652.0 01.767 1.955 2.647 2.647.0 01-.767 1.955 2.646 2.646.0 01-1.955.767 2.645 2.645.0 01-1.955-.767zm-.211 22.906a.441.441.0 01-.134-.326V29.79a.444.444.0 01.134-.326.446.446.0 01.326-.134h3.527a.446.446.0 01.326.134.445.445.0 01.134.326v18.707a.443.443.0 01-.134.326.443.443.0 01-.326.134h-3.527a.443.443.0 01-.326-.134z"/><path d="m114.019 47.734a8.1 8.1.0 01-3.047-4.255 14.439 14.439.0 01-.652-4.37 14.3 14.3.0 01.614-4.371A7.869 7.869.0 01114 30.56a9.072 9.072.0 015.252-1.5 8.543 8.543.0 015.041 1.5 7.985 7.985.0 013.009 4.14 12.439 12.439.0 01.69 4.37 13.793 13.793.0 01-.651 4.37 8.255 8.255.0 01-3.028 4.275 8.475 8.475.0 01-5.1 1.553 8.754 8.754.0 01-5.194-1.534zm7.629-3.1a4.536 4.536.0 001.476-2.262 11.335 11.335.0 00.383-3.221 10.618 10.618.0 00-.383-3.22 4.169 4.169.0 00-1.457-2.243 4.066 4.066.0 00-2.531-.785 3.942 3.942.0 00-2.453.785 4.376 4.376.0 00-1.5 2.243 11.839 11.839.0 00-.383 3.22 11.84 11.84.0 00.383 3.221 4.222 4.222.0 001.476 2.262 4.075 4.075.0 002.549.8 3.8 3.8.0 002.44-.809z"/><path d="m15.105 32.057v15.565a.059.059.0 01-.049.059L.069 50.25A.06.06.0 01.005 50.167l14.987-33.47a.06.06.0 01.114.025z"/><path d="m17.631 23.087v24.6a.06.06.0 00.053.059l22.449 2.507a.06.06.0 00.061-.084L17.745.032a.06.06.0 00-.114.024z"/><path d="m39.961 52.548-24.833 7.45a.062.062.0 01-.043.0L.079 52.548a.059.059.0 01.026-.113h39.839a.06.06.0 01.017.113z"/></svg></a><div class=footer-languages><a tabindex=-1 lang=en id=switch-lang-en class="footer-languages-item active"><svg class="icon tick"><use xlink:href="/v1.21/img/icons.svg#tick"/></svg>
|
||
English
|
||
</a><a tabindex=-1 lang=zh id=switch-lang-zh class=footer-languages-item>中文</a></div></div><ul class=footer-policies><li class=footer-policies-item><a class=footer-policies-link href=https://www.linuxfoundation.org/legal/terms>Terms and Conditions
|
||
</a>|
|
||
<a class=footer-policies-link href=https://www.linuxfoundation.org/legal/privacy-policy>Privacy policy
|
||
</a>|
|
||
<a class=footer-policies-link href=https://www.linuxfoundation.org/legal/trademark-usage>Trademarks
|
||
</a>|
|
||
<a class=footer-policies-link href=https://github.com/istio/istio.io/edit/release-1.21/content/en/index>Edit this Page on GitHub</a></li></ul><div class=footer-base><span class=footer-base-copyright>© 2024 the Istio Authors.</span>
|
||
<span class=footer-base-version>Version
|
||
Archive
|
||
1.21.2</span><ul class=footer-base-releases><li class=footer-base-releases-item><a tabindex=-1 class=footer-base-releases-link onclick='return navigateToUrlOrRoot("https://istio.io/blog/2021/ncc-security-assessment/"),!1'>current release</a></li><li class=footer-base-releases-item><a tabindex=-1 class=footer-base-releases-link onclick='return navigateToUrlOrRoot("https://preliminary.istio.io/blog/2021/ncc-security-assessment/"),!1'>next release</a></li><li class=footer-base-releases-item><a tabindex=-1 class=footer-base-releases-link href=https://istio.io/archive>older releases</a></li></ul></div></div></footer><div id=scroll-to-top-container aria-hidden=true><button id=scroll-to-top title='Back to top' tabindex=-1><svg class="icon top"><use xlink:href="/v1.21/img/icons.svg#top"/></svg></button></div></body></html> |