There was a recent post about whether to enable ufw and it made me ask: how protected I am from a rogue docker container? I have a single server with 15-20 docker containers running at any given time. Should one get hacked or be malicious from the get go, are there (hopefully easy to implement for an armchair sysadmin) best practices to mitigate such an event? Thanks!

You are viewing a single thread.
View all comments
1 point

What is a rogue docker container?

permalink
report
reply
1 point

If the source of the image is getting hacked/ the maintainer does make a backdoor, etc

permalink
report
parent
reply
1 point

Doesn’t make any sense since you can see all the code and what you are installing.

permalink
report
parent
reply
1 point

The people who read the source code of all their Docker containers and especially understand everything in there are probably around 1%.

permalink
report
parent
reply

Self-Hosted Main

!main@selfhosted.forum

Create post

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.

For Example

  • Service: Dropbox - Alternative: Nextcloud
  • Service: Google Reader - Alternative: Tiny Tiny RSS
  • Service: Blogger - Alternative: WordPress

We welcome posts that include suggestions for good self-hosted alternatives to popular online services, how they are better, or how they give back control of your data. Also include hints and tips for less technical readers.

Useful Lists

Community stats

  • 14

    Monthly active users

  • 1.8K

    Posts

  • 11K

    Comments

Community moderators