-
-
Save Shrumplestiltskin/a01c01c9cf64576aefab5011f0d81b9d to your computer and use it in GitHub Desktop.
Revisions
-
Shrumplestiltskin revised this gist
Jan 16, 2019 . 1 changed file with 4 additions and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -72,7 +72,10 @@ https://lwn.net/Articles/543273/ http://stealth.openwall.net/xSports/clown-newuser.c - Escaping Docker container using waitid() – CVE-2017-5123 https://www.twistlock.com/labs-blog/escaping-docker-container-using-waitid-cve-2017-5123/ https://www.cyberark.com/threat-research-blog/how-i-hacked-play-with-docker-and-remotely-ran-code-on-the-host/ ### Docker -
Shrumplestiltskin revised this gist
Nov 6, 2018 . 1 changed file with 4 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -28,6 +28,10 @@ https://www.blackhat.com/docs/eu-15/materials/eu-15-Bettini-Vulnerability-Exploi - This is the authoritative documentation on the design, interface and conventions of cgroup v2: https://www.kernel.org/doc/Documentation/cgroup-v2.txt - Capabilities https://linux.die.net/man/7/capabilities libcap2-bin provides capsh in deb ### Escaping -
Shrumplestiltskin revised this gist
Nov 6, 2018 . 1 changed file with 3 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -47,6 +47,9 @@ https://security.stackexchange.com/questions/152978/is-it-possible-to-escalate-p - Abusing Privileged and Unprivileged Linux Containers https://www.nccgroup.trust/globalassets/our-research/us/whitepapers/2016/june/container_whitepaper.pdf - Understanding and Hardening Linux Containers https://www.nccgroup.trust/globalassets/our-research/us/whitepapers/2016/april/ncc_group_understanding_hardening_linux_containers-1-1.pdf - An Empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments http://taviso.decsystem.org/virtsec.pdf -
Shrumplestiltskin revised this gist
Nov 6, 2018 . 1 changed file with 3 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -64,6 +64,9 @@ https://plus.google.com/+MathiasKrause/posts/PqFCo4bfrWu https://lwn.net/Articles/543273/ http://stealth.openwall.net/xSports/clown-newuser.c - Escaping Docker container using waitid() – CVE-2017-5123 https://www.twistlock.com/labs-blog/escaping-docker-container-using-waitid-cve-2017-5123/ ### Docker -
Shrumplestiltskin revised this gist
Nov 6, 2018 . 1 changed file with 8 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -56,6 +56,14 @@ https://www.ernw.de/download/ERNW_Stocard_Docker-Devops-Security_fbarth-mluft.pd - Docker: Security Myths, Security Legends - Rory McCune https://youtu.be/uQigvjSXMLw - user ns: arbitrary module loading https://lkml.org/lkml/2013/3/4/70 https://plus.google.com/+MathiasKrause/posts/PqFCo4bfrWu - Anatomy of a user namespaces vulnerability https://lwn.net/Articles/543273/ http://stealth.openwall.net/xSports/clown-newuser.c ### Docker -
Shrumplestiltskin revised this gist
Nov 6, 2018 . 1 changed file with 3 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -53,6 +53,9 @@ http://taviso.decsystem.org/virtsec.pdf - Docker & Security - Florian Barth, Matthias Luft https://www.ernw.de/download/ERNW_Stocard_Docker-Devops-Security_fbarth-mluft.pdf - Docker: Security Myths, Security Legends - Rory McCune https://youtu.be/uQigvjSXMLw ### Docker -
FrankSpierings revised this gist
Jun 15, 2017 . 1 changed file with 96 additions and 30 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -1,51 +1,117 @@ # Container security notes ## Internet references ### Kernel and architecture - namespaces - overview of Linux namespaces http://man7.org/linux/man-pages/man7/namespaces.7.html - mount_namespaces - overview of Linux mount namespaces http://man7.org/linux/man-pages/man7/mount_namespaces.7.html - Major and Minor (device) Numbers http://www.makelinux.net/ldd3/chp-3-sect-2 - cgroups - Linux control groups http://man7.org/linux/man-pages/man7/cgroups.7.html - How to find namespaces in a Linux system http://www.opencloudblog.com/?p=251 - Anatomy of a Container: Namespaces, cgroups & Some Filesystem Magic - LinuxCon https://www.slideshare.net/jpetazzo/anatomy-of-a-container-namespaces-cgroups-some-filesystem-magic-linuxcon - Vulnerability Exploitation In Docker Container Environments https://www.blackhat.com/docs/eu-15/materials/eu-15-Bettini-Vulnerability-Exploitation-In-Docker-Container-Environments.pdf - This is the authoritative documentation on the design, interface and conventions of cgroup v2: https://www.kernel.org/doc/Documentation/cgroup-v2.txt ### Escaping - False Boundaries and Arbitrary Code Execution https://forums.grsecurity.net/viewtopic.php?f=7&t=2522 - Container escape through open_by_handle_at (shocker exploit) https://lists.linuxcontainers.org/pipermail/lxc-devel/2014-June/009547.html https://github.com/gabrtv/shocker/blob/master/shocker.c - Chw00t: How to break out from various chroot solutions https://deepsec.net/docs/Slides/2015/Chw00t_How_To_Break%20Out_from_Various_Chroot_Solutions_-_Bucsay_Balazs.pdf - Is it possible to escalate privileges and escaping from a Docker container? (security.stackexchange.com) https://security.stackexchange.com/questions/152978/is-it-possible-to-escalate-privileges-and-escaping-from-a-docker-container - Abusing Privileged and Unprivileged Linux Containers https://www.nccgroup.trust/globalassets/our-research/us/whitepapers/2016/june/container_whitepaper.pdf - An Empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments http://taviso.decsystem.org/virtsec.pdf - Docker & Security - Florian Barth, Matthias Luft https://www.ernw.de/download/ERNW_Stocard_Docker-Devops-Security_fbarth-mluft.pdf ### Docker - My DockerCon 2014 talk: Thoughts on interoperable containers https://fabiokung.com/2014/06/11/my-dockercon-2014-talk/ - Building a Secure App with Docker - Ying Li and David Lawrence, Docker https://www.slideshare.net/Docker/building-a-secure-app-with-docker-ying-li-and-david-lawrence-docker https://www.youtube.com/watch?v=tjxkxVI_PVU - Docker Daemon tuning and JSON file configuration https://sandro-keil.de/blog/2017/01/23/docker-daemon-tuning-and-json-file-configuration/ ### Kubernetes - Apparmor https://kubernetes.io/docs/tutorials/clusters/apparmor/#upgrading-to-kubernetes-v14-with-apparmor - Security Best Practices http://blog.kubernetes.io/2016/08/security-best-practices-kubernetes-deployment.html - PodSecurityPolicy https://kubernetes.io/docs/api-reference/v1.6/#podsecuritypolicyspec-v1beta1-extensions ### Hardening & Security - Security In-Depth for Linux Software - Preventing and Mitigating Security Bugs https://www.cr0.org/paper/jt-ce-sid_linux.pdf - Security Best Practices for Kubernetes Deployment http://blog.kubernetes.io/2016/08/security-best-practices-kubernetes-deployment.html - Understanding and Hardening Linux Containers https://www.nccgroup.trust/globalassets/our-research/us/whitepapers/2016/april/ncc_group_understanding_hardening_linux_containers-1-1.pdf - DEF CON 23 - Aaron Grattafiori - Linux Containers: Future or Fantasy? - 101 Track https://www.youtube.com/watch?v=iN6QbszB1R8 - Linux Containers (LXC), Docker, and Security https://www.slideshare.net/jpetazzo/linux-containers-lxc-docker-and-security/2-OutlineFear_Uncertainty_and_Doubtand_the - The Golden Ticket- Docker and High Security Microservices - Black Belt Track https://www.youtube.com/watch?v=346WmxQ5xtk http://www.slideshare.net/Docker/the-golden-ticket-docker-and-high-security-microservices-by-aaron-grattafiori - Security Lab: Seccomp http://training.play-with-docker.com/security-seccomp/ - How to Run a More Secure Non-Root User Container: http://www.projectatomic.io/blog/2016/01/how-to-run-a-more-secure-non-root-user-container/ ### Tools - The Docker Bench for Security is a script that checks for dozens of common best-practices around deploying Docker containers in production. https://github.com/docker/dockerbench-security - Clair - Vulnerability Static Analysis for Containers https://github.com/coreos/clair - AppArmor profile generator for docker containers. Basically a better AppArmor profile, than creating one by hand, because who would ever do that. https://github.com/jessfraz/bane -
FrankSpierings renamed this gist
Jun 8, 2017 . 1 changed file with 0 additions and 0 deletions.There are no files selected for viewing
File renamed without changes. -
FrankSpierings created this gist
Jun 8, 2017 .There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -0,0 +1,51 @@ - Vulnerability Exploitation In Docker Container Environments https://www.blackhat.com/docs/eu-15/materials/eu-15-Bettini-Vulnerability-Exploitation-In-Docker-Container-Environments.pdf - How to Run a More Secure Non-Root User Container: http://www.projectatomic.io/blog/2016/01/how-to-run-a-more-secure-non-root-user-container/ - This is the authoritative documentation on the design, interface and conventions of cgroup v2: https://www.kernel.org/doc/Documentation/cgroup-v2.txt - cgroups - Linux control groups http://man7.org/linux/man-pages/man7/cgroups.7.html - mount_namespaces - overview of Linux mount namespaces http://man7.org/linux/man-pages/man7/mount_namespaces.7.html - How to find namespaces in a Linux system http://www.opencloudblog.com/?p=251 - namespaces - overview of Linux namespaces http://man7.org/linux/man-pages/man7/namespaces.7.html - Anatomy of a Container: Namespaces, cgroups & Some Filesystem Magic - LinuxCon https://www.slideshare.net/jpetazzo/anatomy-of-a-container-namespaces-cgroups-some-filesystem-magic-linuxcon - Major and Minor (device) Numbers http://www.makelinux.net/ldd3/chp-3-sect-2 - False Boundaries and Arbitrary Code Execution https://forums.grsecurity.net/viewtopic.php?f=7&t=2522 - Security In-Depth for Linux Software - Preventing and Mitigating Security Bugs https://www.cr0.org/paper/jt-ce-sid_linux.pdf - Container escape through open_by_handle_at (shocker exploit) https://lists.linuxcontainers.org/pipermail/lxc-devel/2014-June/009547.html https://github.com/gabrtv/shocker/blob/master/shocker.c - Chw00t: How to break out from various chroot solutions https://deepsec.net/docs/Slides/2015/Chw00t_How_To_Break%20Out_from_Various_Chroot_Solutions_-_Bucsay_Balazs.pdf - Security Best Practices for Kubernetes Deployment http://blog.kubernetes.io/2016/08/security-best-practices-kubernetes-deployment.html - Is it possible to escalate privileges and escaping from a Docker container? (security.stackexchange.com) https://security.stackexchange.com/questions/152978/is-it-possible-to-escalate-privileges-and-escaping-from-a-docker-container - Abusing Privileged and Unprivileged Linux Containers https://www.nccgroup.trust/globalassets/our-research/us/whitepapers/2016/june/container_whitepaper.pdf - Understanding and Hardening Linux Containers https://www.nccgroup.trust/globalassets/our-research/us/whitepapers/2016/april/ncc_group_understanding_hardening_linux_containers-1-1.pdf