The result of the study can be found at https://arxiv.org/pdf/2307.03958.pdf.

69 points

The amount of the internet and cloud infrastructure that is built on public Docker images makes this… worrying.

permalink
report
reply
47 points

This isn’t really surprising and isn’t actually a real security issue with Docker itself or any of the popular public images. Docker Hub is a public registry so people inexperienced with Docker accidentally include secrets in their images and upload it to Docker Hub, this is actually pretty well known and the Docker docs specifically warn people about this.

permalink
report
parent
reply
-1 points

How can you be sure it doesn’t affect popular images? The probability may be lower, but I don’t think you can rule it out.

permalink
report
parent
reply
18 points

The most popular images on Docker Hub are official / library images, they are curated and monitored by Docker for best practices and security vulnerabilities. I’m not saying that means you should trust them completely, it’s always best practice to read the source of an image before you use it.

permalink
report
parent
reply
11 points

This doesn’t mean that YOUR secrets are exposed by using the image, btw - this means that whomever built that image would be accidentally exposing their secrets.

Unless you built the image and added your secrets to it and then uploaded it to a public Docker registry. But again, that’s not a flaw in Docker.

permalink
report
parent
reply
7 points

Sane way you cant be sure your soap isnt poision, sure the manufacturing line could have messed up but like… the shady burger joint down the street is a lot more likely to have slipped up. The probability of anything is not zero, but we ignore a hell of a lot of possibilities

permalink
report
parent
reply
6 points

There is a nonzero probability of getting hit by a meteor at any time. A woman in Alabama was hit by one while she was inside her home, you’re not even safe indoors!

You all might think I’m a fool for wearing a helmet every time I leave my definitely meteor-proof house, but I’m not taking any chances.

permalink
report
parent
reply
20 points

Isn’t it about people pushing their keys to public? I feel like this doesn’t affect the pulling side

permalink
report
parent
reply
10 points

It’s actually how people build their images, in which some include sensitive data (when they should definitely not). It’s the same problem as exposed S3 buckets actually, nothing wrong with docker in itself.

permalink
report
parent
reply
6 points

aws s3 sync s3://barrys-nudes/ .

permalink
report
parent
reply
2 points

Have you seen the instructions on how to build the Lemmy images? That’s some crazy shit …

permalink
report
parent
reply
3 points

I guess it depends, if it’s a secret in use for the image, an attacker might use it to attack a pulled instance if the user deploying it didn’t change the secret. Kind of like an unchanged initial password.

permalink
report
parent
reply
1 point
*

Is this even a legitimate problem? Lots of people, myself included, have a “local” configuration. All of the services and credentials mentioned in the config are running on my personal machine for testing only during active development. None of those credentials refer to any sort of “real” service that’s on 24/7 and accessible via the internet. It’s effectively dummy data to the rest of the world and I imagine there are a ton of false positives like what I just described.

permalink
report
parent
reply
-20 points

Natural selection. Docker apes must suffer.

permalink
report
parent
reply
16 points
*

Of course. In my opinion, what Docker is used for on Hub is a different model than it was originally supposed to solve. It was designed as a solution for enterprise where the development team had no easy control over the production environment, so the solution was to bundle the platform with the software. However, your production team is usually trustworthy, so leaking secrets via the container isn’t an issue (or actually sometimes you wanted the image to include secrets).

The fact that Hub exists is a problem in itself in my opinion. Even things like the AUR - which comes with its own set of problems - is a better solution.

nix provides a solution to build clean Docker images. But then again it only works for packages that are either in nixpkgs already or you have written a derivation for, the latter being probably more effort than a quick and dirty dockerfile.

permalink
report
reply
17 points

Well not the Hub itself is the problem, rather the fact it’s being used wrong. You’re not supposed to publish your private images publicly, if you do that’s your problem. The Hub (or Docker) are pretty much completely unrelated to this issue. People who do this are probably also going to leave S3 buckets unsecured, commit passwords to Git and so on and so forth.

permalink
report
parent
reply
1 point

Hub is for the Dev, not the OP (Heh)

permalink
report
parent
reply
15 points
*

I’m sure plenty of the offenders are legitimate, but it’s completely safe to check private key pairs into code, or to bake them in to images. It entirely depends on what the key pairs are used for. Very common to include key pairs for development/test environments, for example. If it’s a production secret, of course you don’t do this.

permalink
report
reply
9 points

You’re right in one sense but when you get to the last sentence your argument breaks down.

The same type of secret should be treated the same way. The problem with treating environments different is that it builds bad habits especially for new devs who come in and see it being done in a certain way. But also, humans screw up and it’s better to just build the habit of not committing anything private outside of prod-like credential stores even if it’s not the prod instance.

permalink
report
parent
reply
3 points

Yeah, exactly. Don’t allow it anywhere, way less chance someone forgets to remove them from the prod build.

permalink
report
parent
reply
12 points

Is there a list of which ones are vulnerable?

permalink
report
reply
15 points

permalink
report
parent
reply
5 points

Bad admins gonna bad. shrug

We build all our image layers in house from a base nginx or node image. We’re moving to [scratch[(https://hub.docker.com/_/scratch/) soon to even eliminate going to Docker hub at all.

For home stuff, I don’t super care. I’ll just update as necessary and if something happens and someone gets in, it’s just my stuff.

permalink
report
reply
3 points

Fixed link for the lazy: scratch

permalink
report
parent
reply
1 point

What will you be replacing docker with?

permalink
report
parent
reply
5 points

Docker will still be around but each image will be built and deployed to our local registry. Docker hub is being taken out of the equation.

permalink
report
parent
reply
1 point

This is the way.

permalink
report
parent
reply
-1 points

UBI micro from Red Hat is awesome… Just saying. And it’s free 😂

permalink
report
parent
reply
6 points

fuck redhat

permalink
report
parent
reply

Linux

!linux@lemmy.ml

Create post

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word “Linux” in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

  • Posts must be relevant to operating systems running the Linux kernel. GNU/Linux or otherwise.
  • No misinformation
  • No NSFW content
  • No hate speech, bigotry, etc

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

Community stats

  • 9.8K

    Monthly active users

  • 5.8K

    Posts

  • 162K

    Comments