Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

agnos.is Forums

  1. Home
  2. Programmer Humor
  3. Context: Docker bypasses all UFW firewall rules

Context: Docker bypasses all UFW firewall rules

Scheduled Pinned Locked Moved Programmer Humor
programmerhumor
105 Posts 58 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • D [email protected]

    I DIDNT KNOW THAT! WOW, this puts “not to use network_mode: host” another level.

    G This user is from outside of this forum
    G This user is from outside of this forum
    [email protected]
    wrote last edited by
    #80

    Actually I believe host networking would be the one case where this isn't an issue. Docker isn't adding iptables rules to do NAT masquerading because there is no IP forwarding being done.

    When you tell docker to expose a port you can tell it to bind to loopback and this isn't an issue.

    1 Reply Last reply
    1
    • T [email protected]

      Did you allow the containers to talk to eachother with ufw after setting it up?

      Q This user is from outside of this forum
      Q This user is from outside of this forum
      [email protected]
      wrote last edited by
      #81

      Yes, you can fix it by doing this

      echo "Adding rules for Docker subnets to allow communication between containers..."
      for subnet in $(docker network inspect bridge -f '{{range .IPAM.Config}}{{.Subnet}} {{end}}'); 
          sudo ufw allow from $subnet
          echo "Added rule for $subnet"
      done
      
      1 Reply Last reply
      1
      • I [email protected]

        We use Firewalld integration with Docker instead due to issues with UFW. Didn't face any major issues with it.

        Q This user is from outside of this forum
        Q This user is from outside of this forum
        [email protected]
        wrote last edited by
        #82

        I also ended up using firewalld and it mostly worked, although I first had to change some zone configs.

        1 Reply Last reply
        2
        • Q [email protected]

          Docker docs:

          Docker routes container traffic in the nat table, which means that packets are diverted before it reaches the INPUT and OUTPUT chains that ufw uses. Packets are routed before the firewall rules can be applied, effectively ignoring your firewall configuration.

          S This user is from outside of this forum
          S This user is from outside of this forum
          [email protected]
          wrote last edited by
          #83

          For all the raving about podman, it's dumb too. I've seen multiple container networks stupidly route traffic across each other when they shouldn't. Yay services kept running, but it defeats the purpose. Networking should be so hard that it doesn't work unless it is configured correctly.

          diplomjodler3@lemmy.worldD 1 Reply Last reply
          6
          • S [email protected]

            For all the raving about podman, it's dumb too. I've seen multiple container networks stupidly route traffic across each other when they shouldn't. Yay services kept running, but it defeats the purpose. Networking should be so hard that it doesn't work unless it is configured correctly.

            diplomjodler3@lemmy.worldD This user is from outside of this forum
            diplomjodler3@lemmy.worldD This user is from outside of this forum
            [email protected]
            wrote last edited by
            #84

            Or maybe it should be easy to configure correctly?

            R S 2 Replies Last reply
            12
            • Q [email protected]

              Do you mean a hardware firewall?

              M This user is from outside of this forum
              M This user is from outside of this forum
              [email protected]
              wrote last edited by
              #85

              Basically yeah, though I didn't specify hardware because of how often virtualization is done now

              Q 1 Reply Last reply
              1
              • M [email protected]

                Basically yeah, though I didn't specify hardware because of how often virtualization is done now

                Q This user is from outside of this forum
                Q This user is from outside of this forum
                [email protected]
                wrote last edited by
                #86

                The VPS I'm using unfortunately doesn't offer an external firewall

                M 1 Reply Last reply
                0
                • ohshit604@sh.itjust.worksO [email protected]

                  So I happened to follow the advice from that Proxmox post, enabled the “Discard” option for the disk and ran sudo fstrim / within the VM, now the Proxmox LVM-Thin partition is sitting at a comfortable 135Gb out of 377Gb.

                  Think I’m going to use this fstrim command on my main desktop to free up space.

                  S This user is from outside of this forum
                  S This user is from outside of this forum
                  [email protected]
                  wrote last edited by [email protected]
                  #87

                  I think linux does fstrim oob.

                  edit: I meant to say linux distros are set up to do that automatically.

                  ohshit604@sh.itjust.worksO 1 Reply Last reply
                  0
                  • Q [email protected]

                    Also when using a rootfull Podman socket?

                    D This user is from outside of this forum
                    D This user is from outside of this forum
                    [email protected]
                    wrote last edited by
                    #88

                    When running as root, I did not need to add the firewall rule.

                    Q 1 Reply Last reply
                    2
                    • S [email protected]

                      My impression from a recent crash course on Docker is that it got popular because it allows script kiddies to spin up services very fast without knowing how they work.

                      OWASP was like "you can follow these thirty steps to make Docker secure, or just run Podman instead." https://cheatsheetseries.owasp.org/cheatsheets/Docker_Security_Cheat_Sheet.html

                      appoxo@lemmy.dbzer0.comA This user is from outside of this forum
                      appoxo@lemmy.dbzer0.comA This user is from outside of this forum
                      [email protected]
                      wrote last edited by
                      #89

                      Another take: Why should I care about dependency hell if I can just spin up the same service on the same machine without needing an additional VM and with minimal configuration changes.

                      1 Reply Last reply
                      0
                      • Q [email protected]

                        Docker docs:

                        Docker routes container traffic in the nat table, which means that packets are diverted before it reaches the INPUT and OUTPUT chains that ufw uses. Packets are routed before the firewall rules can be applied, effectively ignoring your firewall configuration.

                        H This user is from outside of this forum
                        H This user is from outside of this forum
                        [email protected]
                        wrote last edited by
                        #90

                        Nat is not security.

                        Keep that in mind.

                        It's just a crutch ipv4 has to use because it's not as powerful as the almighty ipv6

                        Q 1 Reply Last reply
                        10
                        • K [email protected]

                          Try podman and quadlets

                          C This user is from outside of this forum
                          C This user is from outside of this forum
                          [email protected]
                          wrote last edited by
                          #91

                          What advantage does it have over nspawn?

                          1 Reply Last reply
                          0
                          • H [email protected]

                            Nat is not security.

                            Keep that in mind.

                            It's just a crutch ipv4 has to use because it's not as powerful as the almighty ipv6

                            Q This user is from outside of this forum
                            Q This user is from outside of this forum
                            [email protected]
                            wrote last edited by
                            #92

                            Counterpoint

                            1 Reply Last reply
                            1
                            • D [email protected]

                              When running as root, I did not need to add the firewall rule.

                              Q This user is from outside of this forum
                              Q This user is from outside of this forum
                              [email protected]
                              wrote last edited by
                              #93

                              Thanks for checking

                              1 Reply Last reply
                              1
                              • Q [email protected]

                                The VPS I'm using unfortunately doesn't offer an external firewall

                                M This user is from outside of this forum
                                M This user is from outside of this forum
                                [email protected]
                                wrote last edited by
                                #94

                                Well, if you have the option you could set up a virtual network through the VPS and have a box with pfsense or something to route all traffic through. Take this with a grain of salt - I've seen this done but never done it fully myself.

                                Q 1 Reply Last reply
                                1
                                • M [email protected]

                                  Well, if you have the option you could set up a virtual network through the VPS and have a box with pfsense or something to route all traffic through. Take this with a grain of salt - I've seen this done but never done it fully myself.

                                  Q This user is from outside of this forum
                                  Q This user is from outside of this forum
                                  [email protected]
                                  wrote last edited by
                                  #95

                                  I've just disabled all incoming connections (including SSH etc.) and access everything through WireGuard

                                  1 Reply Last reply
                                  1
                                  • diplomjodler3@lemmy.worldD [email protected]

                                    Or maybe it should be easy to configure correctly?

                                    R This user is from outside of this forum
                                    R This user is from outside of this forum
                                    [email protected]
                                    wrote last edited by
                                    #96

                                    instructions unclear, now its hard to use and to configure

                                    1 Reply Last reply
                                    1
                                    • M [email protected]

                                      I mean if you're hosting anything publicly, you really should have a dedicated firewall

                                      ohshit604@sh.itjust.worksO This user is from outside of this forum
                                      ohshit604@sh.itjust.worksO This user is from outside of this forum
                                      [email protected]
                                      wrote last edited by
                                      #97

                                      have a dedicated firewall

                                      I mean, don’t router firewalls count in this regard? Isn’t that kinda part of their job?

                                      1 Reply Last reply
                                      0
                                      • S [email protected]

                                        I think linux does fstrim oob.

                                        edit: I meant to say linux distros are set up to do that automatically.

                                        ohshit604@sh.itjust.worksO This user is from outside of this forum
                                        ohshit604@sh.itjust.worksO This user is from outside of this forum
                                        [email protected]
                                        wrote last edited by [email protected]
                                        #98

                                        It’s been about a day since this issue and now I’ve been keeping a close eye on my local-lvm, it fills fast, like, ridiculously fast and I’ve been having to run sudo fstrim / inside the VM just to keep it maintained. I’m finding it weird I’m now just noticing this as this server has been running for months!

                                        For now I edited my /etc/bash.bashrc so whenever I ssh in it’ll automatically run sudo fstrim /, there is something I’m likely missing but this works as a temporary solution.

                                        1 Reply Last reply
                                        0
                                        • grrgyle@slrpnk.netG [email protected]

                                          I exposed them because I used the container for local development too. I just kept reseeding every time it got hacked before I figured I should actually look into security.

                                          firelizzard@programming.devF This user is from outside of this forum
                                          firelizzard@programming.devF This user is from outside of this forum
                                          [email protected]
                                          wrote last edited by
                                          #99

                                          Where are you working that your local machine is regularly exposed to malicious traffic?

                                          grrgyle@slrpnk.netG 1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups