Skip to main content


Historically, most HPC clusters utilize a security model that is "hard on the exterior and soft and gushy on the interior". It is not that a user has free roam once logged in, but rather we tend to rely on just simple POSIX security models on the inside. For example, one of the common practices is to completely disable SELinux on a new cluster setup. Just kill it because it gets in the way.

For that reason, most critical HPC clusters leverage VPNs and/or bastion hosts with multi-factor authentication (MFA) to help secure it on the outside. But even with MFA and secure ssh connections through a bastion host, it is still possible for malicious users to gain access to these systems. Security being like layers of an onion is accurate, but on an HPC system, those layers are predominately on the outside of the cluster, not the inside.

Warewulf was written and designed from the ground up to go a bit further. And while certain parallelization and high performance library capabilities still require lowering the security threshold, Warewulf strives to not be a blocker here.


The Warewulf server itself was developed with SELinux enabled in "targeted" and "enforcing" mode and with the firewall active.

Additionally, the provisioning process fully supports SELinux by default. In previous versions you had to enable a switch to support SELinux, but in Warewulf v4 and above, it is always enabled, but you do have to make some configuration changes.

  1. The first thing to do is to change the provision "Root" option. By default this is initramfs which means, take whatever file system the kernel hands us. By default this is a ramfs type file system (however this may not always be the case) and this format does not support extended file attributes which are required for SELinux. Instead you must configure Warewulf to use tmpfs for the provisioning file system. That change is made like: $ sudo wwctl profile set --root tmpfs default.

  2. That is all you have to do to ensure that Warewulf will probably support SELinux. Once that is done, you just need to enable SELinux in /etc/sysconfig/selinux and install the appropriate profiles into the container.

Provisioning Security

Provisioning in generally is known to be rather "insecure" because when a user lands on a compute node, there is generally nothing stopping them from spoofing a provision request and downloading the provisioned raw materials for inspection.

In Warewulf there are two ways to secure the provisioning process:

  1. The provisioning connections and transfers are not secure due to not being able to manage a secure root of trust through a PXE process. The best way to secure the provisioning process is to enact a vLAN used specifically for provisioning. Warewulf supports this but you must consult your switch documentation and features to implement a default vLAN for provisioning and ensure that the runtime operating system is configured for a different tagged vLAN once booted.

  2. While a vLAN secures the provisioning process, it does not secure the post boot file provisioning via the Runtime Overlay. The default configuration for Warewulf is to only allow requests for the Runtime Overlay through a privileged remote port (e.g. one that only the superuser can open). This is the default configuration for Warewulf and wwclient but it can be changed in the /etc/warewulf/warewulf.conf file under warewulf:secure: true).


Warewulf does not limit the security posture of a cluster at all, and perhaps it increases it as not all provisioners work with firewalls and SELinux enabled and enforcing. But even with that, cluster security is always up to the system manager and organizational policies. Our job is just to ensure that we don't limit those policies in any way.