Docker Secure Computing Profile Generator
This tool allows you to pipe the output of strace through it and will auto-generate a docker seccomp profile that can be used to only whitelist the syscalls your container needs to run and blacklists everything else.
This adds a LOT of security by drastically limiting your attack surface to only what is needed.
SCMP_ARCH_X86SCMP_ARCH_X32
$ brew install blacktop/tap/seccomp-genDownload from releases
$ strace -ff curl github.com 2>&1 | scgen -verbose
• found syscall: execve
• found syscall: brk
• found syscall: access
• found syscall: access
• found syscall: openat
• found syscall: fstat
• found syscall: mmap
...$ ls -lah
-rw-r--r-- 1 blacktop staff 6.7K Dec 1 21:23 seccomp.jsonCreate a new Dockerfile
FROM <your>/<image>:<tag>
RUN apt-get update && apt-get install -y strace
CMD ["strace","-ff","/your-entrypoint.sh"]Build scgen image
$ docker build -t <your>/<image>:scgen .Generate seccomp profile from docker logs output
docker run --rm --security-opt seccomp=unconfined <your>/<image>:scgen 2>&1 | scgen -verboseUse your 🆕 seccomp profile
docker run --rm --security-opt no-new-privileges --security-opt seccomp=/path/to/seccomp.json <your>/<image>:<tag>I have noticed that strace misses things, but if you run with the generate seccomp profile docker should tell you the next syscall it needs by erroring out. Then you can add that one manually and repeat the process.
- https://blog.jessfraz.com/post/how-to-use-new-docker-seccomp-profiles/
- https://github.com/antitree/syscall2seccomp
- https://github.com/xfernando/go2seccomp
- filter strace through linux (32|64bit) tbl files like Jess does
- add support for consuming sysdig output
- only add current arch to arches
- opencontainers/runc#1951
- moby/moby#38333
Find a bug? Want more features? Find something missing in the documentation? Let me know! Please don't hesitate to file an issue
MIT Copyright (c) 2018 blacktop