Merge pull request #24782 from tonistiigi/load-sec

Update docker load security docs
This commit is contained in:
Sebastiaan van Stijn 2016-07-19 09:06:27 +02:00 коммит произвёл GitHub
Родитель dc0d6040e4 f17469e890
Коммит 5fe3e006e4
1 изменённых файлов: 5 добавлений и 7 удалений

Просмотреть файл

@ -120,13 +120,11 @@ certificates](https.md).
The daemon is also potentially vulnerable to other inputs, such as image
loading from either disk with 'docker load', or from the network with
'docker pull'. This has been a focus of improvement in the community,
especially for 'pull' security. While these overlap, it should be noted
that 'docker load' is a mechanism for backup and restore and is not
currently considered a secure mechanism for loading images. As of
Docker 1.3.2, images are now extracted in a chrooted subprocess on
Linux/Unix platforms, being the first-step in a wider effort toward
privilege separation.
'docker pull'. As of Docker 1.3.2, images are now extracted in a chrooted
subprocess on Linux/Unix platforms, being the first-step in a wider effort
toward privilege separation. As of Docker 1.10.0, all images are stored and
accessed by the cryptographic checksums of their contents, limiting the
possibility of an attacker causing a collision with an existing image.
Eventually, it is expected that the Docker daemon will run restricted
privileges, delegating operations well-audited sub-processes,