Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

robustify isolation #53

Open
parmentelat opened this issue Dec 12, 2017 · 0 comments
Open

robustify isolation #53

parmentelat opened this issue Dec 12, 2017 · 0 comments

Comments

@parmentelat
Copy link
Owner

Consider the following actions for improving security

  • --cap-drop=all ou a minima --cap-drop=MKNOD (capabilities supported in docker 1.2)
    et aussi --cap-drop=NET_RAW

  • Note that since 1.10, there is also support of seccomp-bpf - fine-grained access control to kernel syscalls; this should be fine

  • mount all volumes with -o nosuid

  • verify if the global docker option -icc=false; enable this if it does not break anything (should not)

  • double check why on earth we insert all users in the docker group

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant