nettrust
ufw-docker-automated
nettrust | ufw-docker-automated | |
---|---|---|
3 | 6 | |
21 | 195 | |
- | - | |
0.0 | 1.8 | |
about 2 years ago | 7 months ago | |
Go | Go | |
MIT License | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
nettrust
-
Dynamic Outbound Firewall Authorizer (With NFTables)
Today I have this project up and running in my home and I am so happy seeing it working and doing with ease what I was doing manually all this time. The project as the title says is called NetTrust and you can find additional information in the repo: [NetTrust](https://github.com/ulfox/nettrust) in github
-
Dynamic Firewall Authorizer
Repo: https://github.com/ulfox/nettrust
ufw-docker-automated
-
Docker developers discuss changes in how ports are to be forwarded into containers
I know it looks daunting, but it's just putting ufw-style rules into your docker-compose files. There are other solutions like ufw docker automated , but they seem even more annoying to setup.
-
Securing a VPS running docker
Or this for a more automated one: https://github.com/shinebayar-g/ufw-docker-automated
-
Stay safe with Docker and firewall
This is nothing new and a known issue for a very long time with docker and ufw and easily sorted by using this workaround.
-
Docker overrides UFW rules
Known issue for years but this and this helps.
-
A Docker footgun led to a vandal deleting NewsBlur's MongoDB database
Luckily it was about as hardened as regular ftp can be, but I noticed the problem when my service wasn't able to log in as the (very low) connection limit was filled by someone attempting passwords.
I've been using https://github.com/shinebayar-g/ufw-docker-automated to make docker compliant with UFW, and defining firewall rules as labels for the containers.
-
Checklist for hardening a linux VPS?
I found this script, but haven't had the time to try it.
What are some alternatives?
Gravitational Teleport - The easiest, and most secure way to access and protect all of your infrastructure.
ufw-docker - To fix the Docker and UFW security flaw without disabling iptables
opensnitch - OpenSnitch is a GNU/Linux interactive application firewall inspired by Little Snitch.
opensnitch - OpenSnitch is a GNU/Linux application firewall
api-firewall - Fast and light-weight API proxy firewall for request and response validation by OpenAPI specs.
JShielder - Hardening Script for Linux Servers/ Secure LAMP-LEMP Deployer/ CIS Benchmark
wag - Simple Wireguard 2FA
How-To-Secure-A-Linux-Server - An evolving how-to guide for securing a Linux server.
iptables-docker - A bash solution for docker and iptables conflict
whalewall - Automate management of firewall rules for Docker containers
debian_bridge - CLI utility to run .deb packages on non-debian distros using docker
Moby - The Moby Project - a collaborative project for the container ecosystem to assemble container-based systems