-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Implement Docker rootless mode #32
Comments
Additionalk infos from Toni: Things that can be done on side of a server admin or developer Even if all containers are kept up to date there is a fair risk attackers can use a "Zero day attack". a) ROOT USER: b) USER REMAPPING c) LIMIT ACCESS AND CAPS My current idea is to review the docker-default profile in contrast to the geonode stack and tighten it if possible. d) SECURE THE DAEMON AND PORTS The current ongoing wave of attacks against docker stacks mainly targets the daemon. |
Some notes from Toni regarding the topic:
What can be done here is to start the daemon namespaced. root is root inside the containers,
but mapped to a different user on host. This is best done initially on server setup.
In case you like to remap the host <> container user in a running instance it's
needed to backeup/restore all of your data.
In hope it helps, this is how it worked quite well in my tests:
https://gist.github.com/t-book/ad82ed949c12932d86985e0deb3ec3dd
Further running containers with:
security_opt:
- no-new-privileges
https://docs.datadoghq.com/security_monitoring/default_rules/cis-docker-1.2.0-5.25/#remediation
stopped escaping from containers in my pentests:
https://blog.trailofbits.com/2019/07/19/understanding-docker-container-escapes/
( I will prepare a PR for the later and ask for review )
By the way, an audit with docker bench throws light on some more risks, but that's for 2021 ;)
The text was updated successfully, but these errors were encountered: