zlacker

[return to "A story on home server security"]
1. smarx0+P4[view] [source] 2025-01-05 13:38:36
>>todsac+(OP)
Docker has a known security issue with port exposure in that it punches holes through the firewall without asking your permission, see https://github.com/moby/moby/issues/4737

I usually expose ports like `127.0.0.1:1234:1234` instead of `1234:1234`. As far as I understand, it still punches holes this way but to access the container, an attacker would need to get a packet routed to the host with a spoofed IP SRC set to `127.0.0.1`. All other solutions that are better seem to be much more involved.

◧◩
2. znpy+pc[view] [source] 2025-01-05 14:56:50
>>smarx0+P4
I avoid most docker problems by running unprivileged containers via rootless podman, on a rocky-linux based host with selinux enabled.

At this point docker should be considered legacy technology, podman is the way to go.

◧◩◪
3. diggan+df[view] [source] 2025-01-05 15:18:58
>>znpy+pc
Would that actually save you in this case? OP had their container exposed to the internet, listening for incoming remote connections. Wouldn't matter in that case if you're running a unprivileged container, podman, rocky-linux or with selinux, since everything is just wide open at that point.
◧◩◪◨
4. dboreh+Uf[view] [source] 2025-01-05 15:24:57
>>diggan+df
I think it's more about whether traffic is bound to localhost or a routable interface. Podman has different behavior vs Docker.
[go to top]