@@ -7,10 +7,10 @@ redirect_from:
7
7
title : Protect the Docker daemon socket
8
8
---
9
9
10
- By default, Docker runs via a non-networked Unix socket. It can also
10
+ By default, Docker runs through a non-networked UNIX socket. It can also
11
11
optionally communicate using an HTTP socket.
12
12
13
- If you need Docker to be reachable via the network in a safe manner, you can
13
+ If you need Docker to be reachable through the network in a safe manner, you can
14
14
enable TLS by specifying the ` tlsverify ` flag and pointing Docker's
15
15
` tlscacert ` flag to a trusted CA certificate.
16
16
@@ -73,7 +73,7 @@ to connect to Docker:
73
73
74
74
Next, we're going to sign the public key with our CA:
75
75
76
- Since TLS connections can be made via IP address as well as DNS name, the IP addresses
76
+ Since TLS connections can be made through IP address as well as DNS name, the IP addresses
77
77
need to be specified when creating the certificate. For example, to allow connections
78
78
using ` 10.10.10.20 ` and ` 127.0.0.1 ` :
79
79
@@ -180,7 +180,7 @@ certificates and trusted CA:
180
180
## Secure by default
181
181
182
182
If you want to secure your Docker client connections by default, you can move
183
- the files to the ` .docker ` directory in your home directory -- and set the
183
+ the files to the ` .docker ` directory in your home directory --- and set the
184
184
` DOCKER_HOST ` and ` DOCKER_TLS_VERIFY ` variables as well (instead of passing
185
185
` -H=tcp://$HOST:2376 ` and ` --tlsverify ` on every call).
186
186
0 commit comments