Docker Bench for Security
98 points by toli 10 years ago | 8 comments- vezzy-fnord 10 years agoCertainly good work automating a category of base tests like this, though I notice some odd assumptions being made like having more than 5 ports open at all being an inherent warning, tests that assume presence of systemd and auditd (the audit trail can be useful, though from what I know many distros configure it poorly out of the box, if at all), aufs being marked as a warning (over what - Device-mapper? UnionFS? How is it a security consideration?) and the LXC execution driver being a warning.
EDIT: Apparently the CIS paper justifies marking aufs due to its age and gradual dropping of mainstream support. >5 ports isn't rationalized. LXC driver again legacy reasons in favor of libcontainer (though why do I seem to recall libcontainer had pluggable backends, LXC included... hm...)
- falcolas 10 years agoAUFS can create shared locks between systems which use it. For example, spinning up multiple of the same docker container on AUFS can create a global (to those containers) mutex which serializes process flow.
- falcolas 10 years ago
- robryk 10 years agoWhy is this distributed as a docker container?
Also, their README asks sers to pull their container from index (with no guarantee that it corresponds to the repo and, last I've checked, no real integrity guarantees stronger than "it's coming over ssl from docker.org") and then run it while giving it write access to /etc and command access to the docker daemon. This seems tome to be a very insecure way of starting a process that's not supposed to alter anything.
- krakensden 10 years agoBecause that's their kool-aid.
- contingencies 10 years agoI can't believe this didn't occur to me earlier, but when you think about it, docker containers are like ... "aaS"-aaS!
- collyw 10 years agoI see a lot of hype about Docker these days, with very little concrete evidence of benefits.
- contingencies 10 years ago
- krakensden 10 years ago
- yeukhon 10 years agoLooking at purely just output... this is useful for visual aid, but hard to use it for fully automated health check because I would have to parse the output. This is what made sqlmap hard in my previous work which I was trying to automate these awesome tools together. If I have time I might hack some JSON together...
- vezzy-fnord 10 years agosqlmap is actually quite malleable when it comes to displaying output through the verbosity switches (showing full HTTP req/resps), along with its optional writing data to one of CSV, HTML or sqlite.
- vezzy-fnord 10 years ago