Hacker Newsnew | past | comments | ask | show | jobs | submitlogin
Docker and Security (docker.io)
31 points by mwcampbell on Feb 6, 2014 | hide | past | favorite | 13 comments


Containers are great for isolating trusted applications from one another to ease deployment, but using them for multi-tenant security is ill advised.

Since all containers share the same kernel, any local privilege escalation vulnerability in Linux can be used to escape the container. Such vulnerabilities are much more common than vulnerabilities in mature hypervisors, so virtualization is the safer choice.


This, and also bear in mind that kernel crypto state, particularly for the RNG, is shared.


Oh, fuck. I hadn't even thought of that. That's disaster.


only if you're expecting containers to somehow be a unicorn that lets you give people you don't know have your root password. :)


Could you explain what the implications are? I can see it going really bad if the simple dev/urandom is shared, but what are the practical risks for dev/random? (apart from the simple dos on host/all containers by draining)


Agree. I keep telling that container may provide some benefits but its really not security (especially docker which uses LXC which is still not complete und as you said uses a shared kernel - one plus point is Ubuntu's combination with AppArmor which mitigates certain attacks but configuring AppArmor is itself often overseen. Other distros are worse).

If you want to secure one app from another, just use separate hardware.


So, does Docker run their blog in its own docker container? If so, it crashed!


Oops. Looks like a little hiccup but we're back.


Was this written in response to an irresponsible disclosure?


Hi

We didn't have an irresponsible disclosure. We did recently present some of this information and were asked about our security policy. That policy wasn't yet published or announced so we decided it was important to get it out there, especially leading up to the Docker 1.0 release.

Please feel free to contact me, james@docker.com, if you have any questions or concerns about the policy.

Thanks!


Hm, maybe my comment sounded more harsh than I meant it to - I was more curious because I've seen similar statements from other companies after something bad had happened. Thanks for clarifying.


Not at all, it was written as a result of a presentation we gave and was easily converted in to a blog post.


502 Bad Gateway




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: