Skip to content

Commit 56a070a

Browse files
committed
Clarified the consequences of --network=host
The prior version talked about potential access to DBus, but this is a bogus warning: default OS setups do not bind DBus to localhost or to an abstract Unix socket. It is possible that the original author was thinking of CVE-2020–15257, which affected containerd's abstract Unix socket; they fixed it by switching to a named socket, just as DBus always (?) has done. Signed-off-by: Warren Young <[email protected]>
1 parent 746cbf1 commit 56a070a

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

docs/source/markdown/options/network.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Valid _mode_ values are:
2727

2828
- **container:**_id_: Reuse another container's network stack.
2929

30-
- **host**: Do not create a network namespace, the container uses the host's network. Note: The host mode gives the container full access to local system services such as D-bus and is therefore considered insecure.
30+
- **host**: Use the host's network namespace for the container instead of creating an isolated namespace. Warning: This gives the container full access to abstract Unix domain sockets and to TCP/UDP sockets bound to localhost. Since these mechanisms are often used to prevent access to sensitive system services, isolating them from access by external entities, use of this option may be counted a security hole.
3131

3232
- **ns:**_path_: Path to a network namespace to join.
3333

0 commit comments

Comments
 (0)