Skip to content

Document new rules for seccomp profile#776

Merged
mdlinville merged 1 commit intodocker:vnext-enginefrom
mdlinville:29076_seccomp_update
Jan 20, 2017
Merged

Document new rules for seccomp profile#776
mdlinville merged 1 commit intodocker:vnext-enginefrom
mdlinville:29076_seccomp_update

Conversation

@mdlinville
Copy link

@mdlinville mdlinville commented Dec 2, 2016

Describe the proposed changes

Document new seccomp rules from moby/moby#29076

Unreleased project version

Engine 1.14

Related issue or PR in another project

https://github.com/docker/docker/pull/29076/files

Please take a look

@justincormack @riyazdf

Can you also please clarify the version where this will land? I've put 1.13 for now...

@mdlinville mdlinville added this to the engine/1.13.0 milestone Dec 2, 2016
@mdlinville mdlinville changed the base branch from master to vnext-engine December 2, 2016 19:29
Copy link
Contributor

@riyazdf riyazdf left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Socket changes LGTM after nits and thank you for revamping other sections of the page!


```
$ docker run --rm -it --security-opt seccomp=/path/to/seccomp/profile.json hello-world
In general, these allowances are required for Docker to run correctly. It is not
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think more so than running "correctly," seccomp is instrumental for running Docker containers with least privilege

| `setns` | Deny associating a thread with a namespace. Also gated by `CAP_SYS_ADMIN`. |
| `settimeofday` | Time/date is not namespaced. Also gated by `CAP_SYS_TIME`. |
| `settimeofday` | Time/date is not namespaced. Also gated by `CAP_SYS_TIME`.
| `socket`, `socketcall` | Used to send or receive packets and for other socket operations. All `socket` and `socketcall` calls are blocked except types `AF_UNIX`, `AF_INET`, `AF_INET6`, `AF_NETLINK`, and `AF_PACKET`. |
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@riyazdf
Copy link
Contributor

riyazdf commented Dec 2, 2016

Also I think this change is landing in 1.14, @justincormack can confirm

@mdlinville mdlinville changed the title Document new rules for seccomp profile DO NOT MERGE -Document new rules for seccomp profile Dec 9, 2016
@mdlinville mdlinville changed the title DO NOT MERGE -Document new rules for seccomp profile Document new rules for seccomp profile Jan 20, 2017
@mdlinville mdlinville merged commit 9a821e8 into docker:vnext-engine Jan 20, 2017
@mdlinville mdlinville deleted the 29076_seccomp_update branch January 20, 2017 22:58
@riyazdf
Copy link
Contributor

riyazdf commented Feb 23, 2017

@mstanleyjones: we cherry-picked the code change for 17.03, so can we release these earlier?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants