TLS secured Docker on Ubuntu 16.04 Quickstart
Installing a Vanilla-Docker environment on Ubuntu 16.04 was surprisingly non-straightforward for me. Turns out it would have been actually quite simple, but the docs and tutorials seem to be still assuming 14.04/non-systemd and led me in circles a bit.
The problem is that 16.04 is now based on
systemd and not upstart
anymore, so config files moved around. Previously you would pass docker daemon
options via /etc/default/docker
, this however doesn’t work
anymore. So here is a quick write up on how to set up Docker with
TLS on 16.04 with systemd.
Setting up Docker with TLS on systemd
First a quick edit of the docker systemd service file is necessary. It is
located at /lib/systemd/system/docker.service
. By default it
will launch the docker daemon with a unix socket bound to -H fd://
,
however in my opinion it’s nicer to have all config options at a central place,
namely the daemon.json
config file that is read by the docker daemon
on start.
So first we’ll remove the -H fd://
flag from the
ExecStart
line of the docker.service
file and leave
it plain without flags:
$ cat /lib/systemd/system/docker.service
[...]
ExecStart=/usr/bin/docker daemon
[...]
Next we create the /etc/docker/daemon.json
file and add our settings
there:
{
"tlsverify": true,
"tlscacert": "/etc/docker/YOUR_DOMAIN/ca.pem",
"tlscert" : "/etc/docker/YOUR_DOMAIN/cert.pem",
"tlskey" : "/etc/docker/YOUR_DOMAIN/key.pem",
"hosts" : ["fd://", "tcp://BIND:2376"]
}
As you can see I stored my TLS files in the subdirectory YOUR_DOMAIN
in
the /etc/docker/
directory. The certificates are usually specific
to a domain name so it makes it more obvious. I bound the daemon to two hosts,
first the default unix socket for nicer docker management on the server itself
and the TLS secured TCP address. I use my domain name for BIND
for
the same reason stated previously.
And that should be it, reload
and restart
your docker service and use enable
to
boot it on startup and you should be able to connect:
sudo systemctl daemon-reload
sudo systemctl restart docker
sudo systemctl enable docker
You could add your server user to the docker
group (the unix socket is owned
by this group), however since I manage docker via TCP I opt not to use it and
run docker via sudo if necessary.
Note: don’t forget to distribute certificates to your clients, and set the
DOCKER_HOST
and DOCKER_TLS_VERIFY
environment
variables.
Happy dockering!
Creating the certificates
This is somewhat beyond the scope of this quick post and I’d like to redirect you to the official docs for that.
A really neat tool I encountered though is this GIST by Adam Stankiewicz that can generate certificates quickly:
$ gem install certificate_authority
$ ruby certgen.rb YOUR_DOMAIN
This will generate self signed client and server certificates and store them in
your ~/.docker
folder. Copy the server certificates from
~/.docker/YOUR_DOMAIN
to your server and set the proper
permission:
$ sudo ls -la /etc/docker/YOUR_DOMAIN/
total 20
dr-------- 2 root root 4096 Jun 6 14:29 .
drwx------ 3 root root 4096 Jun 6 15:42 ..
-r-------- 1 root root 1151 Jun 6 14:29 ca.pem
-r-------- 1 root root 1155 Jun 6 14:29 cert.pem
-r-------- 1 root root 1679 Jun 6 14:29 key.pem
Update
Please take note that docker (by default) overrules your UFW firewall rules! I wrote a post on this which you can find here.
You have a question or found an issue?Then head over to Github and open an Issue please!