Secrets Revealed in Container Images: An Internet-wide Study on Occurrence and Impact

07/08/2023
by   Markus Dahlmanns, et al.
0

Containerization allows bundling applications and their dependencies into a single image. The containerization framework Docker eases the use of this concept and enables sharing images publicly, gaining high momentum. However, it can lead to users creating and sharing images that include private keys or API secrets-either by mistake or out of negligence. This leakage impairs the creator's security and that of everyone using the image. Yet, the extent of this practice and how to counteract it remains unclear. In this paper, we analyze 337,171 images from Docker Hub and 8,076 other private registries unveiling that 8.5 Specifically, we find 52,107 private keys and 3,158 leaked API secrets, both opening a large attack surface, i.e., putting authentication and confidentiality of privacy-sensitive data at stake and even allow active attacks. We further document that those leaked keys are used in the wild: While we discovered 1,060 certificates relying on compromised keys being issued by public certificate authorities, based on further active Internet measurements, we find 275,269 TLS and SSH hosts using leaked private keys for authentication. To counteract this issue, we discuss how our methodology can be used to prevent secret leakage and reuse.

READ FULL TEXT

page 2

page 8

research
04/04/2018

Controllable Identifier Measurements for Private Authentication with Secret Keys

The problem of secret-key based authentication under a privacy constrain...
research
04/12/2022

Key Management Based on Ownership of Multiple Authenticators in Public Key Authentication

Public key authentication (PKA) has been deployed in various services to...
research
01/24/2022

On the Complexity of Attacking Elliptic Curve Based Authentication Chips

In this paper we discuss the difficulties of mounting successful attack ...
research
11/11/2022

Committed by Accident: Studying Prevention and Remediation Strategies Against Secret Leakage in Source Code Repositories

Version control systems for source code, such as Git, are key tools in m...
research
01/17/2019

Private Authentication: Optimal Information Theoretic Schemes

The main security service in the connected world of cyber physical syste...
research
08/08/2022

Simplifying Electronic Document Digital Signatures

Electronic documents are typically signed using private keys and the mat...
research
11/13/2019

TPM-FAIL: TPM meets Timing and Lattice Attacks

Trusted Platform Module (TPM) serves as a hardware-based root of trust t...

Please sign up or login with your details

Forgot password? Click here to reset