-
Notifications
You must be signed in to change notification settings - Fork 18
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Restrict internet access from siren container #286
base: stable
Are you sure you want to change the base?
Conversation
- Change restart policy to 'unless-stopped' - Restrict permissions on tmp and run mounts - Add security options to prevent privilege escalation - Implement health checks for the siren service - Enable network encryption for the no_internet network
…for BN_TARGET and VC_TARGET
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
maybe antonD can look at the docker, i just made a small comment
I added some small nitpicks, feel free to revert them! question; this does not expose over SSL currently, right? |
it would also be nice to use the same template for |
Yes, the primary objective of this PR is getting the egress restrictions in place.
Preventing the exfiltration of sensitive data (eg, keys) from the container can largely be achieved using egress rules. But from the browser is another another kettle of fish. I |
Yeah I considered that, but I also wanted to avoid changing the existing siren image, and instead try to wrap it in nice warm security blanket. I would like to explore improving this, and also starting I suggest we explore this in a new issue. |
yeah so, taking a step back here and looking at which dangers actually exist, I think securing browser-siren traffic is paramount because once the
feel free to go ham on the exiting image :-) |
Objective
Security harden, specifically by restricting egress traffic from the siren container unless to approved destinations.