Update docker load security docs
Signed-off-by: Tonis Tiigi <tonistiigi@gmail.com>
This commit is contained in:
parent
e6a97db2c9
commit
f17469e890
1 changed files with 5 additions and 7 deletions
|
@ -120,13 +120,11 @@ certificates](https.md).
|
|||
|
||||
The daemon is also potentially vulnerable to other inputs, such as image
|
||||
loading from either disk with 'docker load', or from the network with
|
||||
'docker pull'. This has been a focus of improvement in the community,
|
||||
especially for 'pull' security. While these overlap, it should be noted
|
||||
that 'docker load' is a mechanism for backup and restore and is not
|
||||
currently considered a secure mechanism for loading images. As of
|
||||
Docker 1.3.2, images are now extracted in a chrooted subprocess on
|
||||
Linux/Unix platforms, being the first-step in a wider effort toward
|
||||
privilege separation.
|
||||
'docker pull'. As of Docker 1.3.2, images are now extracted in a chrooted
|
||||
subprocess on Linux/Unix platforms, being the first-step in a wider effort
|
||||
toward privilege separation. As of Docker 1.10.0, all images are stored and
|
||||
accessed by the cryptographic checksums of their contents, limiting the
|
||||
possibility of an attacker causing a collision with an existing image.
|
||||
|
||||
Eventually, it is expected that the Docker daemon will run restricted
|
||||
privileges, delegating operations well-audited sub-processes,
|
||||
|
|
Loading…
Reference in a new issue