Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

disable access to control routes via 192.168.127.1 #78

Open
ghost opened this issue Dec 27, 2021 · 4 comments
Open

disable access to control routes via 192.168.127.1 #78

ghost opened this issue Dec 27, 2021 · 4 comments

Comments

@ghost
Copy link

ghost commented Dec 27, 2021

Using the podman machine, containers can access forwarder controls via curl -s 192.168.127.1/.... This behavior should probably be disabled or gated in some way.

It has security implications if end users decide to use podman to host containerized applications on Mac for example, which is something that absolutely happens with Docker for Desktop on Mac.

@guillaumerose
Copy link
Contributor

Yes good idea. We could do that with a certificate that can be mounted in the VM.

@ghost
Copy link
Author

ghost commented Jan 4, 2022

What do you think about adding functionality to create unix sockets on VMs that route to services?

Thinking I would like to increase the level of effort to access this to be file system access (or container escape).

@guillaumerose
Copy link
Contributor

What do you think about adding functionality to create unix sockets on VMs that route to services?

It would imply something new in the VM to handle that no? A process or a good systemd magic configuration?

@ghost
Copy link
Author

ghost commented Jan 6, 2022

Could probably take advantage of an ssh client similar to what is being done for unix2unix sockets in the forwarder service. The access is very specific to tools like podman.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant