moby--moby/profiles/seccomp
Justin Cormack 7e3a596a63 Block obsolete socket families in the default seccomp profile
Linux supports many obsolete address families, which are usually available in
common distro kernels, but they are less likely to be properly audited and
may have security issues

This blocks all socket families in the socket (and socketcall where applicable) syscall
except
- AF_UNIX - Unix domain sockets
- AF_INET - IPv4
- AF_INET6 - IPv6
- AF_NETLINK - Netlink sockets for communicating with the ekrnel
- AF_PACKET - raw sockets, which are only allowed with CAP_NET_RAW

All other socket families are blocked, including Appletalk (native, not
over IP), IPX (remember that!), VSOCK and HVSOCK, which should not generally
be used in containers, etc.

Note that users can of course provide a profile per container or in the daemon
config if they have unusual use cases that require these.

Signed-off-by: Justin Cormack <justin.cormack@docker.com>
2017-01-17 17:50:44 +00:00
..
fixtures
default.json Block obsolete socket families in the default seccomp profile 2017-01-17 17:50:44 +00:00
generate.go New seccomp format 2016-09-01 11:53:07 +02:00
seccomp.go profiles/seccomp: fix comment 2016-11-25 11:40:54 +01:00
seccomp_default.go Block obsolete socket families in the default seccomp profile 2017-01-17 17:50:44 +00:00
seccomp_test.go New seccomp format 2016-09-01 11:53:07 +02:00
seccomp_unsupported.go Add engine-api types to docker 2016-09-07 11:05:58 -07:00