Docker Hub security dissed, dodgy container image data damned

Kromtech finds malicious code hiding in enterprise upstart's repositories of software


At DockerCon in San Francisco on Wednesday, CEO Steve Singh highlighted security as one of Docker's core principles.

Only a day earlier, Germany-based security software development shop Kromtech suggested security wasn't a priority for the code containerizer.

Over the past twelve months, Kromtech explained in a blog post, Docker Hub, the container maker's community image repository, hosted at least 17 malicious Docker images that were downloaded at least five million times.

These compromised container blueprints have been dealt with, but Kromtech sees Docker's decision to discontinue the free preview of Docker Security Scanning – a service the container biz provided for Docker Official Images on Docker Hub and for paid private repositories in Docker Cloud – as a sign of its disinterest in security.

"It seems that the Docker ecosystem is becoming more enterprise oriented and the responsibility for safe migration and further secure maintenance falls on ordinary developers," the software biz said.

“As with public repositories like GitHub, Docker Hub is there for the service of the community,” said David Lawrence, head of security at Docker, in a statement emailed to The Register.

“When dealing with open public repositories and open source code, we recommend that you follow a few best practices including: know the content author, scan images before running and use curated official images in Docker Hub and certified content in Docker Store whenever possible.”

Secure, if you pay...

Kromtech's assertion may not be entirely fair since Docker Security Scanning will still be available as a paid service for private repository subscribers. There's Docker Store for vetted images. And Docker says it aims to make scans available for public repositories and for teams and organizations, eventually.

But in appearing to prioritize payment over the security of its ecosystem, Docker risks being compared unfavorably to organizations like npm, which have stepped up security efforts in response to repeated problems with hosted JavaScript packages.

Container-related security woes aren't exclusive to Docker. Similar attacks have been documented on Kubernetes instances too. The most common goal has tended to be exploiting cloud-based code for crypto-mining.

Docker CEO Steve Singh

Docker seeks Golden State burnish for cloud container expansion

READ MORE

Docker has been dogged by security concerns for most of its short existence. A research paper on the subject published last year found 180 vulnerabilities among 356,218 Docker Hub images and argued for adoption of more automated security update mechanisms.

At the same time, those close to the company have argued that vulnerability counts exaggerate the extent of the risk. Back in 2015, Jérôme Petazzoni, then a Docker engineer, explained that a significant fraction of vulnerable Docker Hub images were vulnerable by design.

The reason? Build repeatability. Images with outdated and unsafe versions of Linux or Windows may be retained to ensure containerized applications built with that OS version can be reproduced; such apps might not run on an updated OS.

"For ordinary users, just pulling a Docker image from the DockerHub is like pulling arbitrary binary data from somewhere, executing it, and hoping for the best without really knowing what’s in it," Kromtech contends.

It might also be argued that pretty much any software download involves hoping for the best, because code signing may not be reliable, automated malware scans in app stores don't catch everything, and platform providers may let developers pilfer private data undetected for years. ®

Similar topics


Other stories you might like

  • US won’t prosecute ‘good faith’ security researchers under CFAA
    Well, that clears things up? Maybe not.

    The US Justice Department has directed prosecutors not to charge "good-faith security researchers" with violating the Computer Fraud and Abuse Act (CFAA) if their reasons for hacking are ethical — things like bug hunting, responsible vulnerability disclosure, or above-board penetration testing.

    Good-faith, according to the policy [PDF], means using a computer "solely for purposes of good-faith testing, investigation, and/or correction of a security flaw or vulnerability."

    Additionally, this activity must be "carried out in a manner designed to avoid any harm to individuals or the public, and where the information derived from the activity is used primarily to promote the security or safety of the class of devices, machines, or online services to which the accessed computer belongs, or those who use such devices, machines, or online services."

    Continue reading
  • Intel plans immersion lab to chill its power-hungry chips
    AI chips are sucking down 600W+ and the solution could be to drown them.

    Intel this week unveiled a $700 million sustainability initiative to try innovative liquid and immersion cooling technologies to the datacenter.

    The project will see Intel construct a 200,000-square-foot "mega lab" approximately 20 miles west of Portland at its Hillsboro campus, where the chipmaker will qualify, test, and demo its expansive — and power hungry — datacenter portfolio using a variety of cooling tech.

    Alongside the lab, the x86 giant unveiled an open reference design for immersion cooling systems for its chips that is being developed by Intel Taiwan. The chip giant is hoping to bring other Taiwanese manufacturers into the fold and it'll then be rolled out globally.

    Continue reading
  • US recovers a record $15m from the 3ve ad-fraud crew
    Swiss banks cough up around half of the proceeds of crime

    The US government has recovered over $15 million in proceeds from the 3ve digital advertising fraud operation that cost businesses more than $29 million for ads that were never viewed.

    "This forfeiture is the largest international cybercrime recovery in the history of the Eastern District of New York," US Attorney Breon Peace said in a statement

    The action, Peace added, "sends a powerful message to those involved in cyber fraud that there are no boundaries to prosecuting these bad actors and locating their ill-gotten assets wherever they are in the world."

    Continue reading

Biting the hand that feeds IT © 1998–2022