Still Not Aware of the Loophole of Unintentional Access to Docker? A Proof of Concept

Luyi Li, Yueyang Li, Ruxue Luo, Yuzhen Chen, Wenjun Fan*

*Corresponding author for this work

Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

Abstract

Due to the ease of management and the high performance of the containerization, many services have been deployed on container, e.g., Web server running in Docker. However, the Docker implementation suffers several fatal loopholes. In this paper, we study a persistent security problem of Docker, i.e., the port mapping statement results in a wrong IPTABLES rule, which has been disclosed for a while but is still not solved. Therefore, we are motivated to provide a technical primer as well as a proof of concept for this issue. Nevertheless, we discuss several methods to mitigate the security problem. Further, we apply our network testbed for demonstrating the loophole and the effectiveness of the defense methods. The experimental results show that our approach not only increase the time cost for the attacker to identify the target but also bring negligible overhead for deploying the countermeasures.

Original languageEnglish
Title of host publicationISCC 2023 - 28th IEEE Symposium on Computers and Communications
Subtitle of host publicationComputers and Communications for the Benefits of Humanity
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1331-1334
Number of pages4
ISBN (Electronic)9798350300482
DOIs
Publication statusPublished - 2023
Event28th IEEE Symposium on Computers and Communications, ISCC 2023 - Hybrid, Gammarth, Tunisia
Duration: 9 Jul 202312 Jul 2023

Publication series

NameProceedings - IEEE Symposium on Computers and Communications
Volume2023-July
ISSN (Print)1530-1346

Conference

Conference28th IEEE Symposium on Computers and Communications, ISCC 2023
Country/TerritoryTunisia
CityHybrid, Gammarth
Period9/07/2312/07/23

Keywords

  • Container
  • Docker
  • IPTABLES
  • Port Mapping
  • Unintentional Access

Fingerprint

Dive into the research topics of 'Still Not Aware of the Loophole of Unintentional Access to Docker? A Proof of Concept'. Together they form a unique fingerprint.

Cite this