EC2 Instance Connect is an insecure default!

Andreas Wittig – 20 Aug 2019

You can also listen to this topic in our podcast!

Two months before, Michael wrote about why AWS SSM is a trojan horse. Shortly after that, AWS released EC2 Instance Connect, which is even worse. If you use Amazon Linux 2 or Ubuntu, the chances are high that everyone in your AWS account can SSH into every EC2 instance!

Rant

What is EC2 Instance Connect

EC2 Instance Connect makes your public SSH key available on an EC2 instance using the metadata service. To push your public key to an EC2 instance, you use the SendSSHPublicKey API.

The SSH daemon (sshd) needs to be configured to ask the metadata service for all public keys when someone connects via SSH. This configuration is enabled for you by default on Amazon Linux 2 and Ubuntu AMIs. We discovered this breaking change in November 2018.

Andreas and Michael Wittig

Please support our work!

We have published 327 articles, 41 podcast episodes, and 15 videos. It's all free and means a lot of work in our spare time.

Thanks to Alex DeBrie, e9e4e5f0faef, Goran Opacic, jhoadley, Thorsten Hoeger, Todd Valentine, Vince Fulco, and all anonymous supporters for your help! We also want to thank all supporters who purchased a cloudonaut t-shirt. It gives us great pleasure to send our t-shirts all over the world.

With your help, we can continue to produce independent & high-quality content focused on AWS. Please support us!

Support us

How the backdoor works

These three conditions must be met:

  1. Use the official Amazon Linux 2 or Ubuntu AMIs
  2. Allow traffic on port 22. If you used SSH in the past to manage your instances, the port is already open.
  3. Your IAM user or role needs permissions (action ec2-instance-connect:SendSSHPublicKey). Very likely, you have those permissions thanks to managed policies like AdministratorAccessor PowerUserAccess.

You can now open an SSH connection to every EC2 instance in your AWS account.

Protect yourself

If you are not interested in using EC2 Instance Connect, you can do one of the following:

If you want to use EC2 Instance Connect:

  1. Keep your Security Groups as close as possible and use a VPN to connect to your VPC.
  2. Grant the ec2-instance-connect:SendSSHPublicKey action carefully. According to IAM docs, you only can use a condition to restrict the OS user. According to the EC2 Instance Connect docs, you can also restrict access to specific EC2 instances using resource-level permissions. Unfortunately, EC2 Instance tags don’t seem to be supported.

Summary

AWS released a new feature called EC2 Instance Connect. It is enabled by default on Amazon Linux 2 and Ubuntu AMIs. We would appreciate if AWS would ask us - the customers - before they change defaults that increase our security risks. And we would also love to see up-to-date documentation on the IAM configuration. The information is contradictory at the moment, which is not satisfactory when security is at risk!

Andreas Wittig

Andreas Wittig

I launched cloudonaut.io in 2015 with my brother Michael. Since then, we have published hundreds of articles, podcast episodes, and videos. It’s all free and means a lot of work in our spare time. We enjoy sharing our AWS knowledge with you.
Have you learned something new by reading, listening, or watching our content? If so, we kindly ask you to support us in producing high-quality & independent AWS content. We look forward to sharing our AWS knowledge with you.

Support us

Feedback? Questions? You can reach me via Email, Twitter, or LinkedIn.