this post was submitted on 29 Aug 2025
547 points (99.1% liked)

Programmer Humor

26629 readers
1003 users here now

Welcome to Programmer Humor!

This is a place where you can post jokes, memes, humor, etc. related to programming!

For sharing awful code theres also Programming Horror.

Rules

founded 2 years ago
MODERATORS
 

Docker docs:

Docker routes container traffic in the nat table, which means that packets are diverted before it reaches the INPUT and OUTPUT chains that ufw uses. Packets are routed before the firewall rules can be applied, effectively ignoring your firewall configuration.

top 50 comments
sorted by: hot top controversial new old
[–] veganpizza69@lemmy.vg 124 points 1 month ago
[–] Static_Rocket@lemmy.world 109 points 1 month ago (3 children)

This was a large part of the reason I switched to rootless podman for everything

[–] False@lemmy.world 21 points 1 month ago (2 children)

Explicitly binding certain ports to the container has a similar effect, no?

[–] doughless@lemmy.world 10 points 1 month ago (4 children)

I still need to allow the ports in my firewall when using podman, even when I bind to 0.0.0.0.

load more comments (4 replies)
load more comments (1 replies)
[–] Kr4u7@discuss.tchncs.de 10 points 1 month ago (4 children)

My problem with podman is the incompatibility with portainer :(

Any recommendations?

[–] giacomo@lemmy.dbzer0.com 15 points 1 month ago (1 children)

cockpit has a podman/container extension you might like.

[–] qaz@lemmy.world 8 points 1 month ago* (last edited 1 month ago) (1 children)

It's okay for simple things, but too simple for anything beyond that, IMO. One important issue is that unlike with Portainer you can't edit the container in any way without deleting it and configuring it again, which is quite annoying if you just want to change 1 environment variable (GH Issue). Perhaps they will add a quadlet config tool to cockpit sometime in the future.

[–] giacomo@lemmy.dbzer0.com 6 points 1 month ago

i mean, you can just redeploy the container with the updated variable. thats kinda how they work.

[–] slate@sh.itjust.works 13 points 1 month ago (1 children)

CLI and Quadlet? /s but seriously, that's what I use lol

load more comments (1 replies)
load more comments (2 replies)
[–] pizza_the_hutt@sh.itjust.works 7 points 1 month ago

This is the way.

[–] dangling_cat@piefed.blahaj.zone 38 points 1 month ago (2 children)

I DIDNT KNOW THAT! WOW, this puts “not to use network_mode: host” another level.

[–] exu@feditown.com 17 points 1 month ago (1 children)

network: host gives the container basically full access to any port it wants. But even with other network modes you need to be careful, as any -p <external port>:<container port> creates the appropriate firewall rule automatically.

load more comments (1 replies)
load more comments (1 replies)
[–] dohpaz42@lemmy.world 34 points 1 month ago (3 children)

It’s my understanding that docker uses a lot of fuckery and hackery to do what they do. And IME they don’t seem to care if it breaks things.

[–] marcos@lemmy.world 33 points 1 month ago

To be fair, the largest problem here is that it presents itself as the kind of isolation that would respect firewall rules, not that they don't respect them.

People wouldn't make the same mistake in NixOS, despite it doing exactly the same.

load more comments (2 replies)
[–] grrgyle@slrpnk.net 28 points 1 month ago (1 children)

If I had a nickel for every database I've lost because I let docker broadcast its port on 0.0.0.0 I'd have about 35¢

[–] MangoPenguin@lemmy.blahaj.zone 9 points 1 month ago (8 children)

How though? A database in Docker generally doesn't need any exposed ports, which means no ports open in UFW either.

load more comments (8 replies)
[–] salacious_coaster@infosec.pub 21 points 1 month ago (5 children)

My impression from a recent crash course on Docker is that it got popular because it allows script kiddies to spin up services very fast without knowing how they work.

OWASP was like "you can follow these thirty steps to make Docker secure, or just run Podman instead." https://cheatsheetseries.owasp.org/cheatsheets/Docker_Security_Cheat_Sheet.html

[–] domi@lemmy.secnd.me 49 points 1 month ago

My impression from a recent crash course on Docker is that it got popular because it allows script kiddies to spin up services very fast without knowing how they work.

That's only a side effect. It mainly got popular because it is very easy for developers to ship a single image that just works instead of packaging for various different operating systems with users reporting issues that cannot be reproduced.

[–] null_dot@lemmy.dbzer0.com 32 points 1 month ago

I dont really understand the problem with that?

Everyone is a script kiddy outside of their specific domain.

I may know loads about python but nothing about database management or proxies or Linux. If docker can abstract a lot of the complexities away and present a unified way you configure and manage them, where's the bad?

[–] LordKitsuna@lemmy.world 15 points 1 month ago

That is definitely one of the crowds but there are also people like me that just are sick and tired of dealing with python, node, ruby depends. The install process for services has only continued to become increasingly more convoluted over the years. And then you show me an option where I can literally just slap down a compose.yml and hit "docker compose up - d" and be done? Fuck yeah I'm using that

[–] MangoPenguin@lemmy.blahaj.zone 11 points 1 month ago

No it's popular because it allows people/companies to run things without needing to deal with updates and dependencies manually

load more comments (1 replies)
[–] steventhedev@lemmy.world 18 points 1 month ago

You're forgetting the part where they had an option to disable this fuckery, and then proceeded to move it twice - exposing containers to everyone by default.

I had to clean up compromised services twice because of it.

[–] MangoPenguin@lemmy.blahaj.zone 17 points 1 month ago

This only happens if you essentially tell docker "I want this app to listen on 0.0.0.0:80"

If you don't do that, then it doesn't punch a hole through UFW either.

[–] ohshit604@sh.itjust.works 16 points 1 month ago (6 children)

This post inspired me to try podman, after it pulled all the images it needed my Proxmox VM died, VM won’t boot cause disk is now full. It’s currently 10pm, tonight’s going to suck.

load more comments (6 replies)
[–] MnemonicBump@lemmy.dbzer0.com 16 points 1 month ago

This is why I install on bare metal, baby!

[–] Harbinger01173430@lemmy.world 12 points 1 month ago (1 children)

Nat is not security.

Keep that in mind.

It's just a crutch ipv4 has to use because it's not as powerful as the almighty ipv6

load more comments (1 replies)
[–] MasterNerd@lemmy.zip 12 points 1 month ago (6 children)

I mean if you're hosting anything publicly, you really should have a dedicated firewall

load more comments (6 replies)
[–] jwt@programming.dev 11 points 1 month ago (2 children)

Somehow I think that's on ufw not docker. A firewall shouldn't depend on applications playing by their rules.

[–] qaz@lemmy.world 18 points 1 month ago (3 children)

ufw just manages iptables rules, if docker overrides those it's on them IMO

[–] jwt@programming.dev 9 points 1 month ago (2 children)

Feels weird that an application is allowed to override iptables though. I get that when it's installed with root everything's off the table, but still....

[–] MangoPenguin@lemmy.blahaj.zone 5 points 1 month ago (2 children)

Linux lets you do whatever you want and that's a side effect of it, there's nothing preventing an app from messing with things it shouldn't.

load more comments (2 replies)
load more comments (1 replies)
[–] null_dot@lemmy.dbzer0.com 6 points 1 month ago

Not really.

Both docker and ufw edit iptables rules.

If you instruct docker to expose a port, it will do so.

If you instruct ufw to block a port, it will only do so if you haven't explicitly exposed that port in docker.

Its a common gotcha but it's not really a shortcoming of docker.

load more comments (1 replies)
[–] IsoKiero@sopuli.xyz 7 points 1 month ago

Docker spesifically creates rules for itself which are by default open to everyone. UFW (and underlying eftables/iptables) just does as it's told by the system root (via docker). I can't really blame the system when it does what it's told to do and it's been administrators job to manage that in a reasonable way since forever.

And (not related to linux or docker in any way) there's still big commercial software which highly paid consultants install and the very first thing they do is to turn the firewall off....

[–] stupidcasey@lemmy.world 9 points 1 month ago

On windows (coughing)

[–] jbk@discuss.tchncs.de 9 points 1 month ago

rootless podman and sockets ❤️

[–] iamroot@discuss.tchncs.de 8 points 1 month ago (1 children)

We use Firewalld integration with Docker instead due to issues with UFW. Didn't face any major issues with it.

load more comments (1 replies)
[–] cadekat@pawb.social 7 points 1 month ago (1 children)

I've been playing with systemd-nspawn for my containers recently, and I've been enjoying it!

[–] kurikai@lemmy.world 5 points 1 month ago (2 children)
load more comments (2 replies)
[–] m33@lemmy.zip 5 points 1 month ago

Docker does not play fair, does not play nice. It’s a dozer that plow through everything for devops that yolo and rush to production.

[–] peoplebeproblems@midwest.social 5 points 1 month ago (8 children)

Ok

So, confession time.

I don't understand docker at all. Everyone at work says "but it makes things so easy." But it doesnt make things easy. It puts everything in a box, executes things in a box, and you have to pull other images to use in your images, and it's all spaghetti in the end anyway.

If I can build an Angular app the same on my Linux machine and my windows PC, and everything works identically on either, and The only thing I really have to make sure of is that the deployment environment has node and the angular CLI installed, how is that not simpler than everything you need to do to set up a goddamn container?

[–] qaz@lemmy.world 15 points 1 month ago* (last edited 1 month ago) (4 children)

This is less of an issue with JS, but say you're developing this C++ application. It relies on several dynamically linked libraries. So to run it, you need to install all of these libraries and make sure the versions are compatible and don't cause weird issues that didn't happen with the versions on the dev's machine. These libraries aren't available in your distro's package manager (only as RPM) so you will have to clone them from git and install all of them manually. This quickly turns into hassle, and it's much easier to just prepare one image and ship it, knowing the entire enviroment is the same as when it was tested.

However, the primary reason I use it is because I want to isolate software from the host system. It prevents clutter and allows me to just put all the data in designated structured folders. It also isolates the services when they get infected with malware.

load more comments (4 replies)
[–] sidelove@lemmy.world 13 points 1 month ago (2 children)

have to make sure of is that the deployment environment has node and the angular CLI installed

I have spent so many fucking hours trying to coordinate the correct Node version to a given OS version, fucked around with all sorts of Node management tools, ran into so many glibc compat problems, and regularly found myself blowing away the packages cache before Yarn fixed their shit and even then there's still a serious problem a few times a year.

No. Fuck no, you can pry Docker out of my cold dead hands, I'm not wasting literal man-weeks of time every year on that shit again.

(Sorry, that was an aggressive response and none of it was actually aimed at you, I just fucking hate managing Node.js manually at scale.)

load more comments (2 replies)
[–] null_dot@lemmy.dbzer0.com 7 points 1 month ago

Sure but thats an angular app, and you already know how to manage its environment.

People self host all sorts of things, with dozens of services in their home server.

They dont need to know how to manage the environment for these services because docker "makes everything so easy".

[–] missphant@lemmy.blahaj.zone 5 points 1 month ago

I put off docker for a long time for similar reasons but what won me over is docker volumes and how easy they make it to migrate services to another machine without having to deal with all the different config/data paths.

load more comments (4 replies)
load more comments
view more: next ›