-
Notifications
You must be signed in to change notification settings - Fork 36
Security issue: iojs is run as root #23
Comments
cf also nodejs/docker-node#1 |
Something like: # Use high uid/gid to avoid collisions with the host
RUN groupadd --gid 25000 app && useradd --uid 25000 --gid 25000 --create-home --shell /bin/bash app ...folowed by this just before USER app ...and also modifying Does this sound right? |
Yes sounds right ! |
Un-assigning this, in case anyone else wants to give it a try. |
@pesho I'll give it a shot sometimes next week as I actually need this for a customer. |
@hmalphettes you have probably read this comment in #26, but just to make sure:
|
User namespaces have made it into the experimental release of Docker. moby/moby#12648 |
In case of security flaw in the application run and in docker (as it happenned and will happen)
cf:
http://blog.zeltser.com/post/104976675349/security-risks-and-benefits-of-docker-application
http://thenewstack.io/docker-addresses-more-security-issues-and-outlines-plugin-approach/
http://www.slideshare.net/jpetazzo/docker-linux-containers-lxc-and-security
https://blog.xenproject.org/2014/06/23/the-docker-exploit-and-the-security-of-containers/
The text was updated successfully, but these errors were encountered: