I need to implement anti-virus on-access scanning solution for files inside docker containers using open-source software. Clamav On-Access works fine but have some requirements and limitations:
Does this limitation - "fanotify not working for container events when watching from host", really exists or I just misconfigured ClamAV? I have no deep knowledge how fanotify works with namespaces, but it looks like kernel limitation to me.
UPDATE: Are there any workarounds for this limitation? Adding /var/lib/docker/overlay2/container_id/merged
is one option, because of dynamic container nature clamd.conf
needs to be updated on every container event. But even with added path ClamAV doesn't detect malicious files in the containers.
Running ClamAV per-container creates huge memory overhead, especially for small containers.
Links collection:
To supplement the need to use an antivirus system, Google Cloud, for example, provides a container-optimized OS that is hardened with efficient security measures for hosting Docker containers. It locks the Kubernetes file system such that critical system files are safe from attacks by threat actors.
Docker containers are, by default, quite secure; especially if you run your processes as non-privileged users inside the container. You can add an extra layer of safety by enabling AppArmor, SELinux, GRSEC, or another appropriate hardening system.
New research reveals the scale at which criminals have exploited public open-source Docker repositories to plant malware among container images. A new security analysis of the 4 million container images hosted on the Docker Hub repository revealed that more than half contained at least one critical vulnerability.
Docker uses a technology called namespaces to provide the isolated workspace called the container. When you run a container, Docker creates a set of namespaces for that container. These namespaces provide a layer of isolation.
I have a solution with a patched ClamAV.
I was able to get OnAccessIncludePath working with a patch I posted to clamav-devel mailing list: https://lists.gt.net/clamav/devel/77347#77347.
I ended up with one process using fanotify for static mounts and one using inotify to monitor /var/lib/docker ephemeral mounts. Having 2 instances is still much better than 1 per container. I did a fair bit of load testing and have had the patch in production since about the time I mailed the list.
Sophos didn't work for me but I gave up pretty quickly.
Yes, fanotify only monitors events in the mount namespace that it is running in.
If you love us? You can donate to us via Paypal or buy me a coffee so we can maintain and grow! Thank you!
Donate Us With