-
-
Notifications
You must be signed in to change notification settings - Fork 22
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
add warning about docker iptables behaviour #24
base: next
Are you sure you want to change the base?
Conversation
Don't you think this is enough? |
Hi Nicolas, |
I'm not against adding such a warning, but I'd suggest re-wording it. Keep in mind that this documentation must be understandable by a beginner.
They don't know what is iptables.
"behind a dedicated firewall" or "external" maybe, just to make it clear we're talking about something else than the FW of the VM.
Nope, that is way too confusing and too advanced for the doc. If you don't know what is iptables, the "DOCKER-USER chain" is incomprehensible linguo, too. What we want is make sure users understand that there is a risk that their service will be exposed to the world. So the wording could be changed to: Warning: your eLabFTW instance will be exposed to the whole world if you simply expose the port, as Docker will punch through your firewall, unless you use '127.0.0.1:443' instead of just the port '443', in the "ports:" section of the configuration file. This way the "solution" is the same in doc and config file, and we don't ask users to fiddle with iptables chains. We might even add another warning in the post install doc, with a full section describing this issue, that they'll want to test if their instance is available from another network. The main issue is that the public for these docs are:
So we must balance the level of information given, especially on the main install page, it should not be overwhelming. So in fact, I suggest this instead:
|
Sounds like a good plan. Do you think it would make sense to change the port allocation in the default compose file to '127.0.0.1:443' such that the users have to actively modify it to expose their installation? |
Maybe as an example (commented out), but the default must stay the "works out of the box" configuration.
Yes. |
@tnaegele still interested in finishing up this? |
Docker creates by default iptables rules at startup which expose the elabftw container to the public. This also overwrites rules set with packages such as ufw (installed for instance by default on Ubuntu server). While this is not an elabftw specific behaviour or a bug it might take unexperienced users by surprise and create security issues.
Hence add a warning to the elabftw docs and link to the relevant page of the docker manual.