logoalt Hacker News

mapontoseventhstoday at 12:00 PM4 repliesview on HN

Despite what some people will tell you (including many in the security indistry), Docker is not a strong security boundary, and it should not be treated as one. It shares a kernel with the running system.

It reminds me of the good old days when people would hand out low privilege Linux accounts and rely on the kernel to prevent privilige escalation. Docker is literally the same thing, just with extra steps. Especially today with new kernel LPE'S dropping every 5 minutes.

Yes, Podman is a bit better because you arent handing the attacker root, but... why hand them an account at all? Just use a grown up VM.


Replies

throw0101ctoday at 1:05 PM

> Despite what some people will tell you (including many in the security indistry), Docker is not a strong security boundary, and it should not be treated as one. It shares a kernel with the running system.

Solaris Zones and FreeBSD Jails (their inspiration) also share a kernel with the running system and do not seem to have as many escape vulnerabilities.

(Though partly because there may not be as much scrutiny of course.)

show 1 reply
pezgrandetoday at 2:19 PM

Only works if the Docker socket is mounted which is pretty stupid thing to do and also not something you would do in a "frontend" container. Essentially is like having a password-less ssh

beardedwizardtoday at 12:44 PM

Yeah because I'd rather trade one kernel surface for another.

zenopraxtoday at 12:28 PM

[dead]