Alfredo,  

I have no examples of locking that one on hand but I can imagine that if should 
be feasible to lock that down.










Best regards,

Radek Gruchalski

[email protected] (mailto:[email protected])
 
(mailto:[email protected])
de.linkedin.com/in/radgruchalski/ (http://de.linkedin.com/in/radgruchalski/)

Confidentiality:
This communication is intended for the above-named person and may be 
confidential and/or legally privileged.
If it has come to you in error you must take no action based on it, nor must 
you copy or show it to anyone; please delete/destroy and inform the sender 
immediately.



On Wednesday, 13 April 2016 at 22:14, Alfredo Carneiro wrote:

> Unfortunately, I am facing some problems....even with my INPUT rules allowing 
> just some subnetworks, Docker is accepting connections from everywhere.
>  
> On Wed, Apr 13, 2016 at 5:06 PM, Rad Gruchalski <[email protected] 
> (mailto:[email protected])> wrote:
> > I actually found the complete thing you need. Here we go:  
> >  
> > *nat
> > …
> >  
> > :DOCKER - [0:0]
> > -A PREROUTING -m addrtype --dst-type LOCAL -j DOCKER
> > -A OUTPUT ! -d 127.0.0.0/8 (http://127.0.0.0/8) -m addrtype --dst-type 
> > LOCAL -j DOCKER
> > -A POSTROUTING -s 172.17.0.0/16 (http://172.17.0.0/16) ! -o docker0 -j 
> > MASQUERADE
> > # This is where the docker NAT rules go
> >  
> >  
> > # NAT chains
> >  
> > COMMIT
> >  
> > *filter
> > …
> > :DOCKER - [0:0]
> >  
> > …
> >  
> > -A FORWARD -o docker0 -j DOCKER
> > -A FORWARD -o docker0 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
> > -A FORWARD -i docker0 ! -o docker0 -j ACCEPT
> > -A FORWARD -i docker0 -o docker0 -j ACCEPT
> >  
> >  
> > This gives you everything you need. Thanks to Avinash for pointing this 
> > out.  
> >  
> >  
> >  
> >  
> >  
> >  
> >  
> >  
> >  
> >  
> >  
> > Best regards,

> > Radek Gruchalski
> > 
[email protected] (mailto:[email protected])
 
> > (mailto:[email protected])
> > de.linkedin.com/in/radgruchalski/ (http://de.linkedin.com/in/radgruchalski/)
> >  
> > Confidentiality:
> > This communication is intended for the above-named person and may be 
> > confidential and/or legally privileged.
> > If it has come to you in error you must take no action based on it, nor 
> > must you copy or show it to anyone; please delete/destroy and inform the 
> > sender immediately.
> >  
> >  
> >  
> > On Wednesday, 13 April 2016 at 21:59, Alfredo Carneiro wrote:
> >  
> > > Oh man! Really thanks! It worked!
> > >  
> > > On Wed, Apr 13, 2016 at 4:57 PM, Rad Gruchalski <[email protected] 
> > > (mailto:[email protected])> wrote:
> > > > Have you tried restarting docker daemon afterwards?
> > > >  
> > > >  
> > > >  
> > > >  
> > > >  
> > > >  
> > > >  
> > > >  
> > > >  
> > > >  
> > > > Best regards,

> > > > Radek Gruchalski
> > > > 
[email protected] (mailto:[email protected])
 
> > > > (mailto:[email protected])
> > > > de.linkedin.com/in/radgruchalski/ 
> > > > (http://de.linkedin.com/in/radgruchalski/)
> > > >  
> > > > Confidentiality:
> > > > This communication is intended for the above-named person and may be 
> > > > confidential and/or legally privileged.
> > > > If it has come to you in error you must take no action based on it, nor 
> > > > must you copy or show it to anyone; please delete/destroy and inform 
> > > > the sender immediately.
> > > >  
> > > >  
> > > >  
> > > > On Wednesday, 13 April 2016 at 21:53, Alfredo Carneiro wrote:
> > > >  
> > > > > Hey Rad,
> > > > >  
> > > > > Thanks for your answer! I have added theses lines and now looks very 
> > > > > similar before.
> > > > >  
> > > > > iptables -N DOCKER
> > > > > iptables -A FORWARD -o docker0 -j DOCKER
> > > > > iptables -A FORWARD -o docker0 -m conntrack --ctstate 
> > > > > RELATED,ESTABLISHED -j ACCEPT
> > > > > iptables -A FORWARD -i docker0 ! -o docker0 -j ACCEPT
> > > > > iptables -A FORWARD -i docker0 -o docker0 -j ACCEPT
> > > > >  
> > > > >  
> > > > > However, I am still getting errors.
> > > > >  
> > > > > docker: Error response from daemon: failed to create endpoint 
> > > > > cranky_kilby on network bridge: iptables failed: iptables --wait -t 
> > > > > nat -A DOCKER -p tcp -d 0/0 --dport 8080 -j DNAT --to-destination 
> > > > > 172.17.0.2:8080 (http://172.17.0.2:8080) ! -i docker0: iptables: No 
> > > > > chain/target/match by that name.
> > > > >  (exit status 1).
> > > > >  
> > > > >  
> > > > > This is my iptables -L output:
> > > > >  
> > > > > Chain FORWARD (policy DROP)
> > > > > target     prot opt source               destination          
> > > > > DOCKER     all  --  anywhere             anywhere             
> > > > > ACCEPT     all  --  anywhere             anywhere             ctstate 
> > > > > RELATED,ESTABLISHED
> > > > > ACCEPT     all  --  anywhere             anywhere             
> > > > > ACCEPT     all  --  anywhere             anywhere             
> > > > >  
> > > > > Chain OUTPUT (policy ACCEPT)
> > > > > target     prot opt source               destination          
> > > > > ACCEPT     all  --  anywhere             anywhere             
> > > > >  
> > > > > Chain DOCKER (1 references)
> > > > > target     prot opt source               destination
> > > > >  
> > > > >  
> > > > > I hid the INPUT chain because is very big!
> > > > >  
> > > > > Best Regards,
> > > > >  
> > > > > On Wed, Apr 13, 2016 at 4:29 PM, Rad Gruchalski <[email protected] 
> > > > > (mailto:[email protected])> wrote:
> > > > > > Hi Alfredo,  
> > > > > >  
> > > > > > The only thing you need is:
> > > > > >  
> > > > > > -A FORWARD -o docker0 -j DOCKER
> > > > > > -A FORWARD -o docker0 -m conntrack --ctstate RELATED,ESTABLISHED -j 
> > > > > > ACCEPT
> > > > > > -A FORWARD -i docker0 ! -o docker0 -j ACCEPT
> > > > > > -A FORWARD -i docker0 -o docker0 -j ACCEPT
> > > > > >  
> > > > > >  
> > > > > >  
> > > > > >  
> > > > > >  
> > > > > >  
> > > > > >  
> > > > > >  
> > > > > >  
> > > > > >  
> > > > > >  
> > > > > > Best regards,

> > > > > > Radek Gruchalski
> > > > > > 
[email protected] (mailto:[email protected])
 
> > > > > > (mailto:[email protected])
> > > > > > de.linkedin.com/in/radgruchalski/ 
> > > > > > (http://de.linkedin.com/in/radgruchalski/)
> > > > > >  
> > > > > > Confidentiality:
> > > > > > This communication is intended for the above-named person and may 
> > > > > > be confidential and/or legally privileged.
> > > > > > If it has come to you in error you must take no action based on it, 
> > > > > > nor must you copy or show it to anyone; please delete/destroy and 
> > > > > > inform the sender immediately.
> > > > > >  
> > > > > >  
> > > > > >  
> > > > > > On Wednesday, 13 April 2016 at 21:27, Alfredo Carneiro wrote:
> > > > > >  
> > > > > > > Hello guys,
> > > > > > >  
> > > > > > > I don't know if that is the right place to ask. So, since we use 
> > > > > > > public cloud, we are trying to hardening our servers allowing 
> > > > > > > traffic just from our subnetworks. However, when I tried to 
> > > > > > > implement some iptables rules I got problems with Docker, which 
> > > > > > > couldn't find its chain anymore.
> > > > > > >  
> > > > > > > Then, I am wondering if anyone has ever implemented any iptables 
> > > > > > > rule in this scenario.
> > > > > > >  
> > > > > > > I've seen this[1] "tip", however, I think that it is not apply to 
> > > > > > > this case, because it is very "static".
> > > > > > >  
> > > > > > > [1] - https://fralef.me/docker-and-iptables.html
> > > > > > >  
> > > > > > > Best Regards,
> > > > > > >  
> > > > > > > --  
> > > > > > > Alfredo Miranda  
> > > > > >  
> > > > >  
> > > > >  
> > > > >  
> > > > > --  
> > > > > Alfredo Miranda  
> > > >  
> > >  
> > >  
> > >  
> > > --  
> > > Alfredo Miranda  
> >  
>  
>  
>  
> --  
> Alfredo Miranda  

Reply via email to