The UTS namespace should not be shared with the host
Set up the docker integration.
Description
UTS namespaces provide isolation between two system identifiers: the hostname and the NIS domain name. It is used to set the hostname and the domain which are visible to running processes in that namespace. Processes running within containers do not typically require to know either the hostname or the domain name. The UTS namespace should therefore not be shared with the host.
Rationale
Sharing the UTS namespace with the host provides full permission for each container to change the hostname of the host. This is not in line with good security practice and should not be permitted.
Audit
Run this command: docker ps --quiet --all | xargs docker inspect --format '{{ .Id }}: UTSMode={{ .HostConfig.UTSMode }}'
If this command returns host
, it means the host UTS namespace is shared with the container and this recommendation is non-compliant. If the above command returns nothing, then the host’s UTS namespace is not shared. This recommendation is then compliant.
You should not start a container with the --uts=host
argument. For example, do not start a container using the command docker run --rm --interactive --tty --uts=host rhel7.2
Impact
None
Default value
By default, all containers have the UTS namespace enabled and the host UTS namespace is not shared with any containers.
References
- https://docs.docker.com/engine/reference/run/#uts-settings-uts
- http://man7.org/linux/man-pages/man7/namespaces.7.html
CIS controls
Version 6
18 Application Software Security Application Software Security