Skip to content

Docker Socket Security

TSDProxy requires Docker socket access. Understanding the security implications is critical.

Why Socket Access Is Needed

  • List/discover containers with tsdproxy.* labels
  • Read port mappings, network settings, and labels
  • Watch container start/stop events in real time

Security Risk

Mounting /var/run/docker.sock gives full Docker API access. A compromised TSDProxy could start, stop, or delete any container.

Mitigations

Docker Socket Proxy

Use tecnativa/docker-socket-proxy:

services:
  docker-proxy:
    image: tecnativa/docker-socket-proxy
    volumes:
      - /var/run/docker.sock:/var/run/docker.sock:ro
    environment:
      CONTAINERS: 1
      EVENTS: 1
    ports:
      - "2375:2375"

  tsdproxy:
    image: almeidapaulopt/tsdproxy:2
    environment:
      DOCKER_HOST: tcp://docker-proxy:2375

Firewall

sudo ufw allow from 100.64.0.0/10 to any port 8080

Caution

Never expose unauthenticated Docker TCP to any network.

Last updated on