TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Docker Hub Maintenance

42 点作者 tlwaddington大约 6 年前

5 条评论

huslage大约 6 年前
&quot;Given the nature of this update and the need to ensure the highest level of security, we have provided limited advanced notice. We understand that the maintenance process impacts our customers, and we apologize in advance for any inconvenience this may cause.&quot; -- This is a ridiculous statement. Security does not come from opaque statements made at the last moment.<p>I fail to understand how updating a &quot;cloud native&quot; service requires downtime at all, much less this sort of outage.
评论 #19819377 未加载
评论 #19819445 未加载
评论 #19819227 未加载
chrismeller大约 6 年前
24 hours notice for up to 8 hours of downtime (“read only”) seems quite abrupt.
评论 #19819761 未加载
mh-大约 6 年前
They nearly-erased the page in the last few minutes..<p>Here&#x27;s the original from time of submission: <a href="https:&#x2F;&#x2F;web.archive.org&#x2F;web&#x2F;20190503141604&#x2F;https:&#x2F;&#x2F;success.docker.com&#x2F;article&#x2F;docker-hub-maintenance" rel="nofollow">https:&#x2F;&#x2F;web.archive.org&#x2F;web&#x2F;20190503141604&#x2F;https:&#x2F;&#x2F;success.d...</a><p>Now as of my comment the entire body of the page is:<p><i>Docker Hub Maintenance - May 2019</i><p><i>In early May, 2019, Docker Inc. will perform maintenace on the Docker Hub.</i><p><i>This article details actions to be taken, timeline, and any current status&#x2F;issues&#x2F;recommendations.</i>
bovermyer大约 6 年前
I guess this weekend I&#x27;ll be setting up my own registry. Gives me an opportunity to do something I&#x27;ve been meaning to do for awhile anyway.
评论 #19820749 未加载
david_shaw大约 6 年前
If this is related to security, I think users deserve to know what&#x27;s up.<p>As someone working in security, I&#x27;m fairly distraught that I <i>still</i> don&#x27;t know exactly what happened last week. The Docker post-mortem[1] states:<p><i>&gt; On Thursday, April 25th, 2019, we discovered unauthorized access to a single Docker Hub database storing a subset of non-financial user data. Upon discovery, we acted quickly to intervene and secure the site.</i><p><i>&gt; During a brief period of unauthorized access to a Docker Hub database, sensitive data from approximately 190,000 accounts may have been exposed (less than 5% of Hub users). Data includes usernames and hashed passwords for a small percentage of these users, as well as GitHub and Bitbucket tokens for Docker autobuilds.</i><p><i>&gt; There was a brief period of unauthorized access to a Docker Hub database. During this time some sensitive data from approximately 190,000 accounts may have been exposed (less than 5% of Hub users). Data includes usernames and hashed passwords for a small percentage of users as well as GitHub and Bitbucket tokens for Docker autobuilds. All these tokens have been revoked.</i><p>To the best of my knowledge, the above excerpts are the entirety of information about the incident that Docker has officially released. This is not nearly the level of detail that any security-conscious customer cares about, and in my opinion, it&#x27;s an egregious violation of trust to not give more information.<p>For those that may not be working in security day-in, day-out, here&#x27;s what I mean:<p>If this incident was, at its core, a DockerHub error that exposed a database to the Internet without proper authentication in place -- and then someone stumbled upon it -- that&#x27;s an embarrassing mistake, but these things happen. I&#x27;d feel comfortable that Docker understands the extent of the breach, and that we can continue to use these products with some degree of confidence.<p>If, however, the breach was -- and we&#x27;re going to the other end of the spectrum here -- a state-backed APT that blew 0days to breach the DockerHub network, then the threat model is <i>significantly</i> different. Did Docker bring in incident response professionals? What were the attackers targeting? How confident can we be that they didn&#x27;t pivot to somewhere else on the Docker infrastructure undetected?<p>I know that Docker is likely trying to save face, and that the former scenario is significantly more likely than the later -- but guessing about whether or not the breach was severe is a ridiculous situation to be in for major organizations that use the DockerHub service.<p>In case anyone was wondering, I wasn&#x27;t personally or professionally impacted by the breach, but we performed full credential rotation anyway. If the breach was more severe than described (e.g., persistent access was established), then that probably wouldn&#x27;t do much good... but it&#x27;s better than just assuming that &quot;only 5% of users could have been impacted,&quot; and doing nothing.<p>I&#x27;m very unhappy with Docker&#x27;s communication of this breach&#x2F;misconfiguration&#x2F;incident&#x2F;whatever it may have actually been. I really hope they release more information (perhaps in the form of a <i>real</i> post-mortem) so that DockerHub users can better understand the risks of using Docker products. In my opinion, it&#x27;s incredibly irresponsible of Docker to keep this information to themselves.<p>1: <a href="https:&#x2F;&#x2F;success.docker.com&#x2F;article&#x2F;docker-hub-user-notification" rel="nofollow">https:&#x2F;&#x2F;success.docker.com&#x2F;article&#x2F;docker-hub-user-notificat...</a>
评论 #19820666 未加载