DKER-EE-001250 - The Docker Enterprise hosts IPC namespace must not be shared.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

IPC (POSIX/SysV IPC) namespace provides separation of named shared memory segments, semaphores, and message queues. IPC namespace on the host thus should not be shared with the containers and should remain isolated.

IPC namespace provides separation of IPC between the host and containers. If the host's IPC namespace is shared with the container, it would allow processes within the container to see all of the IPC on the host system. This breaks the benefit of IPC level isolation between the host and the containers. Someone having access to the container can eventually manipulate the host IPC. Hence, do not share the host's IPC namespace with the containers.

Shared memory segments are used to accelerate inter-process communication. It is commonly used by high-performance applications. If such applications are containerized into multiple containers, the user might need to share the IPC namespace of the containers to achieve high performance. In such cases, the user should still be sharing container specific IPC namespaces only and not the host IPC namespace. The user may share the container's IPC namespace with another container as below:

Example:
docker run --interactive --tty --ipc=container:e3a7a1a97c58 centos /bin/bash

By default, all containers have the IPC namespace enabled and host IPC namespace is not shared with any container.

Solution

This fix only applies to the use of Docker Engine - Enterprise on a Linux host operating system.

Do not start a container with --ipc=host argument.

For example, do not start a container as below:

docker run --interactive --tty --ipc=host centos /bin/bash

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Docker_Enterprise_2-x_Linux-UNIX_V2R1_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-39, CAT|II, CCI|CCI-001414, Rule-ID|SV-235785r627482_rule, STIG-ID|DKER-EE-001250, STIG-Legacy|SV-104741, STIG-Legacy|V-95603, Vuln-ID|V-235785

Plugin: Unix

Control ID: 0dfaa732fa52ee5c21c2ef35deb1f7ecd51219b6ec56f6d505402415413346a5