Do I need to change the way I use Docker when ECI is switched on?#
No, you can continue to use Docker as usual. ECI works under the covers by creating a more secure container.
Do all container workloads work well with ECI?#
The great majority of container workloads run fine with ECI enabled, but a few do not (yet). For the few workloads that don't yet work with Enhanced Container Isolation, Docker is continuing to improve the feature to reduce this to a minimum.
Can I run privileged containers with ECI?#
Yes, you can use the --privileged
flag in containers but unlike privileged
containers without ECI, the container can only use it's elevated privileges to
access resources assigned to the container. It can't access global kernel
resources in the Docker Desktop Linux VM. This allows you to run privileged
containers securely (including Docker-in-Docker). For more information, see Key features and benefits.
Will all privileged container workloads run with ECI?#
No. Privileged container workloads that wish to access global kernel resources inside the Docker Desktop Linux VM won't work. For example, you can't use a privileged container to load a kernel module.
Why not just restrict usage of the --privileged
flag?#
Privileged containers are typically used to run advanced workloads in containers, for example Docker-in-Docker or Kubernetes-in-Docker, to perform kernel operations such as loading modules, or to access hardware devices.
ECI allows the running of advanced workloads, but denies the ability to perform kernel operations or access hardware devices.
Does ECI restrict bind mounts inside the container?#
Yes, it restricts bind mounts of directories located in the Docker Desktop Linux VM into the container.
It doesn't restrict bind mounts of your host machine files into the container, as configured via Docker Desktop's Settings > Resources > File Sharing.
Can I mount the host's Docker Socket into a container when ECI is enabled?#
By default, ECI blocks bind-mounting the host's Docker socket into containers, for security reasons. However, there are legitimate use cases for this, such as when using Testcontainers for local testing.
To enable such use cases, it's possible to configure ECI to allow Docker socket mounts into containers, but only for your chosen (i.e,. trusted) container images, and even restrict what commands the container can send to the Docker engine via the socket. See ECI Docker socket mount permissions.
Does ECI protect all containers launched with Docker Desktop?#
Not yet. It protects all containers launched by users via docker create
and
docker run
.
Prior to Docker Desktop 4.30, it did not protect containers implicitly used by
docker build
with the docker
build driver (the default driver). Starting
with Docker Desktop 4.30, it protects such containers, except for Docker Desktop
on WSL 2 (Windows hosts).
Note that ECI always protects containers used by docker build
, when using the
docker-container build driver, since Docker
Desktop 4.19 and on all supported platforms (Windows with WSL 2 or Hyper-V, Mac,
and Linux).
ECI does not yet protect Docker Desktop Kubernetes pods, Extension containers, and Dev Environments containers.
Does ECI protect containers launched prior to enabling ECI?#
No. Containers created prior to switching on ECI are not protected. Therefore, we recommend removing all containers prior to switching on ECI.
Does ECI affect the performance of containers?#
ECI has very little impact on the performance of
containers. The exception is for containers that perform lots of mount
and
umount
system calls, as these are trapped and vetted by the Sysbox container
runtime to ensure they are not being used to breach the container's filesystem.
With ECI, can the user still override the --runtime
flag from the CLI ?#
No. With ECI enabled, Sysbox is set as the default (and only) runtime for
containers deployed by Docker Desktop users. If a user attempts to override the
runtime (e.g., docker run --runtime=runc
), this request is ignored and the
container is created through the Sysbox runtime.
The reason runc
is disallowed with ECI because it allows users to run as "true
root" on the Docker Desktop Linux VM, thereby providing them with implicit
control of the VM and the ability to modify the administrative configurations
for Docker Desktop, for example.
How is ECI different from Docker Engine's userns-remap mode?#
See How does it work.
How is ECI different from Rootless Docker?#
See How does it work