Michael Lux
New Pleskian
Hello everybody,
recently, we started using the Docker extension of Plesk.
Personally, I think that this extension is - in theory - a brilliant idea.
However, when it comes to the details of implementation, I think that some things have not really been thought through to the end.
This is because of the way Docker interacts with iptables:
By default, it exposes ports to the whole world, not just to localhost!
Even worse, the nat entries used for that seem to "bypass" the protection rules of firewalld (apart from other problems with firewalld and Docker).
Now, when I start a redis instance with the Docker extension, it takes only minutes until the instance is attacked from the outside.
According to Is there a way to bind a docker container to localhost only? this could be solved on the command line, but our "managed hosting" does only allow full access to Plesk, not to the (root) shell of the underlying OS.
Is the any planned feature for the Docker extension to limit the port exposing to localhost?
Is there maybe something the technical support (those have root access) could do to prevent Docker from interfering with iptables altogether?
Best,
Michael
recently, we started using the Docker extension of Plesk.
Personally, I think that this extension is - in theory - a brilliant idea.
However, when it comes to the details of implementation, I think that some things have not really been thought through to the end.
This is because of the way Docker interacts with iptables:
By default, it exposes ports to the whole world, not just to localhost!
Even worse, the nat entries used for that seem to "bypass" the protection rules of firewalld (apart from other problems with firewalld and Docker).
Now, when I start a redis instance with the Docker extension, it takes only minutes until the instance is attacked from the outside.
According to Is there a way to bind a docker container to localhost only? this could be solved on the command line, but our "managed hosting" does only allow full access to Plesk, not to the (root) shell of the underlying OS.
Is the any planned feature for the Docker extension to limit the port exposing to localhost?
Is there maybe something the technical support (those have root access) could do to prevent Docker from interfering with iptables altogether?
Best,
Michael