www.mirantis.com Open in urlscan Pro
2a05:d014:275:cb01:2c5:838c:1ab7:a223  Public Scan

URL: https://www.mirantis.com/blog/confidential-kubernetes-distroless-images-and-phishing-galore
Submission: On October 12 via api from SG — Scanned from DE

Form analysis 2 forms found in the DOM

<form class="search-dropdown"><input id="search-input" autocomplete="off" autocorrect="off" autocapitalize="off" data-di-id="#search-input" class="st-default-search-input"></form>

<form>
  <input class="st-default-search-input st-search-set-focus" type="text" value="" placeholder="Search this site" aria-label="Search this site" id="st-overlay-search-input" autocomplete="off" autocorrect="off" autocapitalize="off">
</form>

Text Content

Mirantis Products & Services
|BLOG
 * Kubernetes
   |
 * Openstack
   |
 * Containers
   |
 * Hybrid Cloud
   |
 * Edge
   |
 * Lens
   |
 * Security


CONTACT US


CONFIDENTIAL KUBERNETES, DISTROLESS IMAGES, AND PHISHING GALORE

Eric Gregory - September 30, 2022


Every Wednesday, Nick Chase and Eric Gregory from Mirantis go over the week’s
cloud native and industry news on the Radio Cloud Native podcast.

This week, John Jainschigg stepped in for Nick, and John and Eric discussed:

 * Mirantis Kubernetes Engine recognition by G2

 * The recently open sourced "Confidential" Kubernetes distribution
   Constellation

 * Wolfi, a new open source Linux "undistro" for container images

 * Phishing scheme targets GitHub accounts with fake CircleCI notifications

 * And more on the podcast, including a 15 year old Python bug and the endgame
   for floppy disks

You can watch the entire episode below or download the podcast from Apple
Podcasts, Spotify, or wherever you get your podcasts. If you'd like to tune into
the next show live, follow Mirantis on LinkedIn to receive our announcement of
the next broadcast.




G2 RECOGNIZES MIRANTIS KUBERNETES ENGINE

John: This week G2, the world’s leading business solutions review website,
recognized Mirantis Kubernetes Engine (MKE) as a leader in the Container
Orchestration category across its Overall and Mid-Market Grid Report.

G2 Grid Reports use validated reviews on G2 and market presence scores to
compare products. In this latest report, Mirantis ranks higher than some of the
most prominent players in the industry, including Red Hat and Amazon Web
Services (AWS).

The G2 report includes quotes from users, and we’ll share just one: “The main
advantage of MKE is we can deploy it anywhere like Virtual server, Cloud, etc.
As a project lead, it is my responsibility to make available nodes to users
easily. And also manage all nodes' performance, mainly worker nodes. After
deploying MKE on our premises, my work becomes very easy. Now, all nodes at one
place. Easy to manage and track. Easy to deploy using launchpad CLI. I've
successfully deployed it on our virtual Linux server. Installation link having
clear instructions to install MKE. Now all performance, updates are happening in
one place.”

If you’d like to check out the G2 report, you can see that here.




"CONFIDENTIAL KUBERNETES" DISTRIBUTION CONSTELLATION OPEN SOURCED

Eric: Edgeless Systems announced the open sourcing of their Kubernetes
distribution called Constellation, which they bill as “Confidential Kubernetes.”
This security-centric distro is wrapped in a runtime-encrypted VM, with the idea
being that all activity inside the cluster is encrypted against everyone
outside, including the cloud provider. Among other things, this provides
encryption at runtime and remote attestation, or verification using
cryptographic certificates. 

Now, all this encryption comes with a performance cost that some benchmarks
estimate could fall between 2 and 8%, so the question for enterprises here is
exactly where they want to land on the security-performance continuum.

You can check out the project on GitHub.


WOLFI, A LINUX "UNDISTRO" FOR SUPPLY CHAIN SECURITY

Eric: Elsewhere in security-conscious tooling, Chainguard announced Wolfi, what
they’re calling a Linux “undistro” intended to serve as a slim and secure base
for container images. That’s W-O-L-F-I—it sounds lupine but it actually refers
to the smallest known species of octopus.

Chainguard calls Wolfi an “undistro” because it doesn’t actually include the
Linux kernel—it assumes it’s running in a container and using the host kernel.
It’s similar in concept to Google’s distroless base, paring down packages in the
base to an absolute minimum—and really it’s more than similar, it seems to be a
pretty direct evolution of that project, while also taking some inspiration from
Alpine Linux. Wolfi features include:

 * SBOM generation at build time

 * Minimized dependencies in the base

 * Daily builds for the base image to keep components up-to-date

 * Support for glibc and musl

Using Wolfi as a base, Chainguard says their images for Go, PHP, and nginx each
contain zero CVEs, compared to counts in the hundreds for the standard versions
of those images. 

If you’re interested in how Wolfi differs from the distroless base, it uses
Chainguard-developed tools called melange and apko to build images from apk
packages (without actually including a package manager like apk or apt in the
base) and doesn’t draw on upstream Debian like distroless.

You can check out Wolfi on GitHub at https://github.com/chainguard-dev/wolfi-os.


PHISHING SCHEME TARGETS GITHUB ACCOUNTS WITH FAKE CIRCLECI NOTIFICATIONS

Eric: A recent phishing scheme targets GitHub accounts with fake CircleCI
notifications. According to GitHub, this campaign began on September 16th. The
false message claims that users need to log in to accept modified privacy
policies and terms of use.

The phishers use a variety of fake domains, including:

 * circle-ci[.]com

 * emails-circleci[.]com

 * circle-cl[.]com

 * email-circleci[.]com

According to CircleCI themselves, legitimate addresses will only ever be at
circleci.com or a subdomain. 

Multi-factor authentication with hardware security keys mitigates these attacks.
If you’re concerned that you’ve already been hit, CircleCI recommends rotating
your credentials for both CircleCI and GitHub and performing a system audit. You
also want to watch out for new users and new SSH keys created within potentially
compromised systems—these are strategies phishers use to maintain access even if
you’ve changed your passwords.

Check out the podcast for more of this week's stories.




SIGN UP FOR OUR NEWSLETTER

SUBSCRIBE

More from Mirantis


TECHNICAL TRAINING

Learn Kubernetes & OpenStack from Deployment Experts

Prep for certification!

View schedule


WHITEPAPER

The Definitive Guide to Container Platforms



READ IT NOW


MIRANTIS WEBSTORE

Purchase Kubernetes support



SHOP NOW

 * 
 * 
 * 
 * 

900 E Hamilton Avenue
Suite 650
Campbell, CA 95008
+1-650-963-9828

Privacy Policy

PRODUCTS

 * Mirantis Flow
 * Mirantis Container Cloud
 * Mirantis Kubernetes Engine
 * Mirantis Secure Registry
 * Mirantis Container Runtime
 * Mirantis OpenStack for Kubernetes

RESOURCES

 * Login to Support
 * What Is Kubernetes?
 * What is the Software Defined Data Center?
 * Getting Started: k0s
 * Getting Started: Lens
 * Training

ABOUT

 * Contact
 * Careers
 * Company
 * Locations
 * Meet the Team

© 2005 - 2022 Mirantis, Inc. All rights reserved. “Mirantis” and “FUEL” are
registered trademarks of Mirantis, Inc. All other trademarks are the property of
their respective owners.



Close


suggested results





Feedback



PRIVACY PREFERENCE CENTER

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
More information
Allow All


MANAGE CONSENT PREFERENCES

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms. You can set your browser to block
or alert you about these cookies, but some parts of the site will not then work.
These cookies do not store any personally identifiable information.

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site. All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

FUNCTIONAL COOKIES

Functional Cookies

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.


BACK BUTTON PERFORMANCE COOKIES



Vendor Search Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Confirm My Choices



COOKIE NOTICE

Our website uses cookies. By clicking “Accept All”, you agree that they can be
stored on your device for ensuring all website functions and analytical,
statistical and marketing purposes as described in our Privacy Policy and Cookie
Policy.

Accept All

Cookies Settings