Join GitHub today
GitHub is home to over 20 million developers working together to host and review code, manage projects, and build software together.
Make Docker play nicely with UFW on Ubuntu #1251
Comments
ghost
assigned
vieux
Jul 24, 2013
|
Hi,
Maybe one day, Docker will be part of the exceptions I'm not sure that adding a rule to ufw in our package is the right thing to do (for security reasons).
|
|
Does ufw also deny connections to 127.0.0.1:4243 ? On Fri, Jul 26, 2013 at 9:30 AM, Victor Vieux notifications@github.comwrote:
|
|
IIRC it only blocks external connections to 4243 by default. Everything |
|
@ndarilek it's because docker uses a bridge and
|
|
Yes, this works for me. Thanks. |
|
For what it's worth, I haven't touched ufw at all with Ubuntu 12.04, and everything seems to be working fine. |
|
I'm not sure ufw is enable by default. On Wed, Aug 7, 2013 at 11:42 PM, Joe Van Dyk notifications@github.comwrote:
Victor VIEUX |
|
Closing because the documentation updates have been merged. |
crosbymichael
closed this
Aug 12, 2013
honi
commented
Aug 7, 2014
|
What about using ufw to limit access to an exposed port from a docker container?
This does not work for me. I can connect from any host to the redis container. Maybe my configuration is wrong. Any help is welcomed! I think my problem is described in #4737. |
ndarilek commentedJul 20, 2013
UFW is Ubuntu's Uncomplicated FireWall. It lets you easily set up block/allow rules with a single command.
Unfortunately, it doesn't play nicely with Docker because they both configure IPTables. A container with ip_forward set to 1 cannot communicate outside of itself, but running:
ufw disable
brings down the firewall and everything starts working fine.
I'm fairly sure it is possible for packages to add UFW configuration such that their own behaviors can be supported, but I'm not immediately sure how. This may be the cause of various network issues under Ubuntu, so making Docker play nicely with UFW might resolve a number of issues for folks.