How do I prevent root access to my docker container

前端 未结 4 685
情书的邮戳
情书的邮戳 2021-01-15 03:48

I am working on hardening our docker images, which I already have a bit of a weak understanding of. With that being said, the current step I am on is preventing the user fr

相关标签:
4条回答
  • 2021-01-15 04:18

    As David mentions, once someone has access to the docker socket (either via API or with the docker CLI), that typically means they have root access to your host. It's trivial to use that access to run a privileged container with host namespaces and volume mounts that let the attacker do just about anything.

    When you need to initialize a container with steps that run as root, I do recommend gosu over something like su since su was not designed for containers and will leave a process running as the root pid. Make sure that you exec the call to gosu and that will eliminate anything running as root. However, the user you start the container as is the same as the user used for docker exec, and since you need to start as root, your exec will run as root unless you override it with a -u flag.

    There are additional steps you can take to lock down docker in general:

    1. Use user namespaces. These are defined on the entire daemon, require that you destroy all containers, and pull images again, since the uid mapping affects the storage of image layers. The user namespace offsets the uid's used by docker so that root inside the container is not root on the host, while inside the container you can still bind to low numbered ports and run administrative activities.

    2. Consider authz plugins. Open policy agent and Twistlock are two that I know of, though I don't know if either would allow you to restrict the user of a docker exec command. They likely require that you give users a certificate to connect to docker rather than giving them direct access to the docker socket since the socket doesn't have any user details included in API requests it receives.

    3. Consider rootless docker. This is still experimental, but since docker is not running as root, it has no access back to the host to perform root activities, mitigating many of the issues seen when containers are run as root.

    0 讨论(0)
  • 2021-01-15 04:31

    Not sure if this work but you can try. Allow sudo access for user/group with limited execution command. Sudo configuration only allow to execute docker-cli. Create a shell script by the name docker-cli with content that runs docker command, eg docker "$@". In this file, check the argument and enforce user to provide switch --user or -u when executing exec or attach command of docker. Also make sure validate the user don't provide a switch saying -u root. Eg

    sudo docker-cli exec -it containerid sh (failed)
    
    sudo docker-cli exec -u root ... (failed)
    
    sudo docker-cli exec -u mysql ... (Passed)
    

    You can even limit the docker command a user can run inside this shell script

    0 讨论(0)
  • 2021-01-15 04:37

    You intrinsically can't prevent root-level access to your container.

    Anyone who can run any Docker command at all can always run any of these three commands:

    # Get a shell, as root, in a running container
    docker exec -it -u 0 container_name /bin/sh
    
    # Launch a new container, running a root shell, on some image
    docker run --rm -it -u 0 --entrypoint /bin/sh image_name
    
    # Get an interactive shell with unrestricted root access to the host
    # filesystem (cd /host/var/lib/docker)
    docker run --rm -it -v /:/host busybox /bin/sh
    

    It is generally considered best practice to run your container as a non-root user, either with a USER directive in the Dockerfile or running something like gosu in an entrypoint script, like what you show. You can't prevent root access, though, in the face of a privileged user who's sufficiently interested in getting it.

    0 讨论(0)
  • 2021-01-15 04:39

    When the docker is normally run from one host, you can do some steps.
    Make sure it is not run from another host by looking for a secret in a directory mounted from the accepted host.

    Change the .bashrc of the users on the host, so that they will start running the docker as soon as they login. When your users needs to do other things on the host, give them an account without docker access and let them sudo to a special user with docker access (or use a startdocker script with a setuid flag).

    Start the docker with a script that you made and hardened, something like startserver.

    #!/bin/bash
    
    settings() {
       # Add mount dirs. The homedir in the docker will be different from the one on the host.
       mountdirs="-v /mirrored_home:/home -v /etc/dockercheck:/etc/dockercheck:ro"
       usroptions="--user $(id -u):$(id -g) -v /etc/passwd:/etc/passwd:ro"   
       usroptions="${usroptions} -v/etc/shadow:/etc/shadow:ro -v /etc/group:/etc/group:ro"
    }
    
    # call function that fills special variables
    settings
    
    image="my_image:latest"
    
    docker run -ti --rm ${usroptions} ${mountdirs} -w $HOME --entrypoint=/bin/bash "${image}"
    

    Adding a variable --env HOSTSERVER=${host} won't help hardening, on another server one can add --env HOSTSERVER=servername_that_will_be_checked.

    When the user logins to the host, the startserver will be called and the docker started. After the call to the startserver add exit to the .bash_rc.

    0 讨论(0)
提交回复
热议问题