Top
Best
New

Posted by anttiharju 6 days ago

A Safer Container Ecosystem with Docker: Free Docker Hardened Images(www.docker.com)
359 points | 97 comments
SomaticPirate 6 days ago|
Wow, "hardened image" market is getting saturated. I saw atleast 3 companies offering this at Kubecon.

Chainguard came to this first (arguably by accident since they had several other offerings before they realized that people would pay (?!!) for a image that reported zero CVEs).

In a previous role, I found that the value for this for startups is immense. Large enterprise deals can quickly be killed by a security team that that replies with "scanner says no". Chainguard offered images that report 0 CVEs and would basically remove this barrier.

For example, a common CVE that I encountered was a glibc High CVE. We could pretty convincingly show that our app did not use this library in way to be vulnerable but it didn't matter. A high CVE is a full stop for most security teams. Migrated to a Wolfi image and the scanner reported 0. Cool.

But with other orgs like Minimus (founders of Twistlock) coming into this it looks like its about to be crowded.

There is even a govt project called Ironbank to offer something like this to the DoD.

Net positive for the ecosystem but I don't know if there is enough meat on the bone to support this many vendors.

fossa1 6 days ago||
The real question isn't whether the market is saturated, it's whether it still exists once Docker gives away the core value prop for free.
xyzzy123 6 days ago|||
Given Docker's track record it won't be free indefinitely, this is a move to gauge demand and generate leads.
johnnypangs 6 days ago||
Good news, you can already pay for it ;)

https://docs.docker.com/dhi/features/#dhi-enterprise-subscri...

ExoticPearTree 6 days ago||||
Most likely yes. There are a lot enterprises out there that only trust paid subscriptions.

Paying for something “secure” comes with the benefit of risk mitigation - we paid X to give us a secure version of Y, hence its not our fault “bad thing” happenned.

MrDarcy 6 days ago|||
Counterpoint: most likely no, it really is about all the downstream impacts of critical and high findings in scanners. The risk of failing a soc2 audit for example. Once that risk is removed then the value prop is also removed.
red-iron-pine 5 days ago||||
F500s trust the paid subscriptions because it means you can escalate the issue -- you're now a paying client so you get support if/when things explode -- and that also gives you a lever to shift blame or ensure compliance.

I recall being an infra lead at an Big Company that you've heard of and having to spend a month working with procurement to get like 6 Mirantis / Docker licenses to do a CCPA compliance project.

staticassertion 6 days ago|||
I don't think this is the case here. The reason you want to lower your CVEs is to say "we're compliant" or "it's not our fault a bad thing happened, we use hardened images". Paying doesn't really change that - your SOC2 doesn't ask how much you spent, it asks what your patching policy is. This makes that checkbox free.
raesene9 6 days ago|||
Yep differentiation is tricky here. Chainguard are expanding out to VM images and programming language repos, but the core of hardened container images has a lot of options.

The question I'd be interested in is, outside of markets where there's a lot of compliance requirements, how much demand is there for this as a paid service...

People like lower CVE images, but are they willing to pay for them. I guess that's an advantage for Docker's offering. If it's free there is less friction to trying it out compared to a commercial offering.

staticassertion 6 days ago|||
If you distribute images to your customers it is a huge benefit to not have them come back with CVEs that really don't matter but are still going to make them freak out.
selkin 5 days ago||
Even if you do SaaS. Some customers would ask you about known vulnerabilities in your images, and making it easy to show quick remediation schedule can make deals easier to close.
thayne 6 days ago||||
> outside of markets where there's a lot of compliance requirements

That includes anyone who wants to sell to the US government (and probably other governments as well).

FedRAMP easentially[1] requires using "hardened" images.

[1]: It isn't strictly required, but without out things like passing security scans and FIPS compliance are more difficult.

idiotsecant 6 days ago|||
Depends what type of shop. If you're in a big dinosaur org and you 'roll your own' that ends up having a vulnerability, you get fired. If you pay someone else and it ends up having a vulnerability you get to blame it on the vendor.
raesene9 6 days ago||
Perhaps in theory, but I’d be willing to wager that most dinosaur orgs have so many unpatched vulns, they would need to fire everyone in their IT org to cover just the criticals
bigstrat2003 6 days ago|||
> There is even a govt project called Ironbank to offer something like this to the DoD.

Note that you don't have to be DoD to use Iron Bank images. They are available to other organizations too, though you do have to sign up for an account.

firesteelrain 6 days ago||
Many IronBank images have CVEs because many are based on ubi8/9 and while some have ubi8/9-micro bases, there are still CVEs. IronBank will disposition the critical and highs. You can access their Vulnerability Tracking Tool and get a free report.

Some images like Vault are pretty bare (eg no shell).

nonameiguess 6 days ago|||
Ironbank was actually doing this before Chainguard existed, and as another mentioned, it's not restricted to DoD and also free to use for anyone, though you do need an account.

My company makes its own competing product that is basically the same thing, and we (and I specifically) were pretty heavily involved in early Platform One. We sell it, but it's basically just a free add-on to existing software subscriptions, an additional inducement to make a purchase, but it costs nothing extra on on its own.

In any case, I applaud Docker. This can be a surprisingly frustrating thing to do, because you can't always just rebase onto your pre-hardened base image and still have everything work, without taking some care to understand the application you're delivering, which is not your application. It was always my biggest complaint with Ironbank and why I would not recommend anyone actually use it. They break containers constantly because hardening to them just means copying binaries out of the upstream image into a UBI container they patch daily to ensure it never has any CVEs. Sometimes this works, but sometimes it doesn't, and it's fairly predictable, like every time Fedora takes a new glibc version that RHEL doesn't have yet, everything that links against starts segfaulting when you try to copy from one to the other. I've told them this many times, but they still don't seem to get it and keep doing it. Plus, they break tags with the daily patching of the same application version, and you can't pin to a sha because Harbor only holds onto three orphaned shas that are no longer associated with a tag.

So short and long of it, I don't know about meat on the bone, but there is real demand and it's getting greater, at least in any kind of government or otherwise regulated business because the government itself is mandating better supply chain provenance. I don't think it entirely makes sense, frankly. The end customers don't seem to understand that, sure, we're signing the container image because we "built" it in the sense that we put together the series of tarballs described by a json file, but we're also delivering an application we didn't develop, on a base image full of upstream GNU/Linux packages we also didn't develop, and though we can assure you all of our employees are US citizens living in CONUS, we're delivering open source software. It's been contributed to by thousands of people from every continent on the planet stretching decades into the past.

Unfortunately, a lot of customers and sales people alike don't really understand how the open source ecosystem works and expect and promise things that are fundamentally impossible. Nonetheless, we can at least deliver the value inherent in patching the non-application components of an image more frequently than whoever creates the application and puts the original image into a public repo. I don't think that's a ton of value, personally, but it's value, and I've seen it done very wrong with Ironbank, so there's value in doing it right.

I suspect it probably has to be a free add-on to some other kind of subscription in most cases, though. It's hard for me to believe it can really be a viable business on its own. I guess Chainguard is getting by somehow, but it also kind of feels like they're an investor darling getting by on the reputations of its founders based on their past work more than the current product. It's the container ecosystem equivalent of selling an enterprise Linux distro, and I guess at least Redhat, SUSE, and Canonical have all managed to do that, but not by just selling the Linux distro. They need other products plus support and professional services.

I think it's a no-brainer for anyone already selling a Linux distro to do this on top of it, though. You've already got the build infrastructure and organizational processes and systems in place.

nathanchou 6 days ago||
CEO of VulnFree here.

I've been in contact with some of the security folks at Iron Bank. The last time we dug into Iron Bank images, they were simply worse than what most vendors offered. They just check the STIG box.

khana 6 days ago|||
[dead]
nathanchou 6 days ago||
CEO of VulnFree here.

I'm not sure if Chainguard was first, but they did come early. The original pain point we looked into when building our company was pricing, but we've since pivoted since there are significant gaps in the market that remain unaddressed.

ShakataGaNai 6 days ago||
> Open Source

Where? Lets take a random example: https://hub.docker.com/hardened-images/catalog/dhi/traefik

Ok, where is the source? Open source means I can build it myself, maybe because I'm working in an offline/airgapped/high compliance environment.

I found a "catalogue" https://github.com/docker-hardened-images/catalog/blob/main/... but this isn't a build file, it's some... specialized DHI tool to build? Nothing https://github.com/docker-hardened-images shows me docs where I can build it myself or any sort of "dhi" tool.

tj_591 5 days ago|
Hi. Yes, we fully intend to open up access to the build tool here. The build file you see is a new format that we've built to be able to do reproducible builds. It's a new frontend on top of buildkit so you can use it with docker build. The team is currently working hard to provide access to this tooling which will enable you to create, build and modify the images in your environment. We just need a couple more days for this to be available.
lrvick 5 days ago||
You do not need a custom buildkit frontend to do reproducible builds with any modern container build system, including docker.

Vanilla docker/buildkit works just fine as we use it in Stagex with just makefiles and Containerfiles which makes it super easy for anyone to reproduce our images with identical digests, and audit the process. The only thing non default we do to docker is have it use the containerd backend that comes with docker distributions since that allows for deterministic digests without pushing to a registry. This lets us have the same digests across all registries.

Additionally our images are actually container native meaning they are "from scratch" all the way down avoiding any trust in upstream build systems like Debian or Alpine or any of their non deterministic package management schemes or their single-point-of-failure trust in individual maintainers.

We will also be moving to LLVM native builds shortly removing a lot of the complexity with multi-arch images for build systems. Easily cross compile all the things from one image.

Honestly we would not at all be mad if Docker just white labeled these as official images as our goal is just to move the internet away from risky and difficult to audit supply chains as opposed to the "last mile" supply chain integrity that is the norm in all other solutions today.

https://stagex.tools

tj_591 6 days ago||
Hi, I work at Docker. Really appreciate the thoughtful discussion here. We’re excited to make Hardened Images free and open because we believe secure-by-default should be the starting point for every developer, not something you bolt on later.

A big part of this for us is transparency. That’s why every image ships with VEX statements, extensive attestations, and all the metadata you need to actually understand what you’re running. We want this to be a trustworthy foundation, not just a thinner base image.

We’re also extending this philosophy beyond base images into other content like MCP servers and related components, because the more of the stack that is verifiable and hardened by default, the better it is for the ecosystem.

A few people in the thread asked how this is sustainable. The short answer is that we do offer an enterprise tier for companies that need things like contractual continuous patching SLAs, regulated-industry variants (FIPS, etc.), and secure customizations with full provenance and attestations. Those things carry very real ongoing costs, so keeping them in Enterprise allows us to make the entire hardened catalog free for the community.

Glad to see the conversation happening here. We hope this helps teams ship software with a stronger security posture and a bit more confidence.

chuckadams 5 days ago|||
What format is the Dockerfile in at, for example, https://hub.docker.com/hardened-images/catalog/dhi/php/image... ? It looks quite different than any Dockerfile I've ever seen. Is there a tool available that builds images from that?
tj_591 5 days ago||
This is a new format that we've built to be able to do reproducible builds. It's a new frontend on top of buildkit so you can use it with docker build. The team is currently working hard to provide access to this tooling which will enable you to create, build and modify the images in your environment. We just need a couple more days for this to be available.
egorfine 5 days ago||
Hi

Don't you personally feel disgust mentioning AI stuff?

Yeah, I realize it is mandatory to mention AI today in every piece of communication of any company; but on a personal level, isn't that something that requires a bit of dying every time?

inChargeOfIT 6 days ago||
It's free for now, just like registries were "free" and docker desktop was free.. until they weren't. I am not against Docker capitalizing and charging for their services (as they should); however, the pattern of offering a service for free and then reneging after it's widely adopted, makes me hesitant to adopt any of their offerings.
sschueller 6 days ago||
Let's hope cases like this will make companies think twice before doing a switcheroo the next time: https://topclassactions.com/lawsuit-settlements/open-lawsuit...
m463 6 days ago||
more annoying is that they prevented the software from being configured to configure the registry to not be theirs.

To the point that redhat created podman that can do what you want.

BSVogler 6 days ago||
First look shows me that this is not an easy drop in replacement. First thing is this requires a log-in and makes me wonder why this is required. Perhaps some upselling coming.

With Bitnami discontinuing their offer, we recently switched to other providers. For some we are using a helm chart and this new offer provides some helm charts but for some software just the image. I would be interested to give this a try but e.g. the python image only various '(dev)' images while the guide mentions the non-dev images. So this requires some planning.

EDIT: Digging deeper, I notice it requires a PAT and a PAT is bound to a personal account. I guess you need the enterprise offering for organisation support. I am not going to waste my time to contact them for an enterprise offer for a small start-up. What is the use case for CVE hardened images that you cannot properly run in an CICD and only on your dev machine? Are there companies that need to follow compliance rules or need this security guarantee but don't have CICD in place?

parasubvert 6 days ago|
I think Docker for Teams is $15/month per seat. https://www.docker.com/pricing/

The enterprise hardened images license seems to be a different offering for offline mirroring or more strict compliance…

The main reason for CVE hardened images is that it’s hard to trust individuals to do it right at scale, even with CI/CD. You’re having to wire together your own scan & update process. In practice teams will use pinned versions, delays in fixing, turn off scanning, etc. This is easy mode

0_gravitas 6 days ago||
The proximity of this and Bitnami pulling their 'free hardened images' is amusing, and I'm just as concerned about another (eventual, but imminent) rug-pull down the line. Docker Inc historically seems comfortable with the typical VC/"growth"-fueled strat of:

1. 'generous' initial offering to establish a userbase/ecosystem/network-effect

2. "oh teehee we're actually gonna have to start charging for that sorry we know that you've potentially built a lot of your infrastructure around this thing"

3. $$$

alias_neo 6 days ago|
We just moved a bunch of infra off of Bitnami images and Charts; we won't be making that mistake again, and Docker is the worst culprit.
TheDong 6 days ago||
Docker has to maintain relatively complicated looking build instructions like this to make these images: https://github.com/docker-hardened-images/catalog/blob/b5c7a...

Meanwhile, nix already has packaged more software than any other distro, and the vast majority of its software can be put into a container image with no additional dependencies (i.e. "hardened" in the same way as these are) with exactly zero extra work specific to each package.

The nixpkgs repository already contains the instructions to build and isolate outputs, there's already a massive cache infrastructure setup, builds are largely reproducible, and docker will have to make all of that for their own tool to reach parity... and without a community behind it like nix has.

nathanchou 6 days ago||
CEO of VulnFree here, a hardened image company.

Our view is that this was largely a marketing maneuver by Docker aimed at disrupting Chainguard’s momentum.

The deeper issue in the container security space is a lack of genuine innovation. Most offerings are incremental (and offer inferior) variations on what Chainguard has already proven.

When Chainguard’s funding round last February drew significant industry attention, it triggered a rush into “secure images” as a category. We know because VCs have been reaching out to us incessantly. That, in turn, pushed Bitnami to attempt monetization of what had historically been free images, and Docker to offer free images to fill the vacuum Bitnami left following their attempt to monetize.

We were monitoring Docker closely and suspect that following their "Docker Hardened Images" splash they realized it was a lot harder to sell into the industry than they initially realized.

The reason source code is rarely shared in this space is straightforward: once it's open-sourced, a meaningful barrier to entry to the hardened image industry largely disappears.

Truthfully, at current prices you're 100% paying for quality of life. From all public pricing figures I've seen, it's cheaper to build hardened images, in-house than to buy from a vendor.

Our offering at VulnFree is technically priced below the cost to build in-house, but our real value add is meeting dev teams where they are per our custom hardened images.

nine_k 6 days ago||
The news: Docker Hardened Images (DHI) are now free to use for everyone. No reason not to use them.

Offering image hardening to custom images looks like a reasonable way for Docker to have a source of sustained income. Regulated industries like banks, insurers, or governmental agencies are likely interested.

scottydelta 6 days ago||
After their last rug pull when they started charging projects for registry after parading it as a fully free service for almost a decade, it has become hard to trust anything free.

Bait and switch once the adoption happens has become way too common in the industry.

cedws 6 days ago|||
Docker is a company I just can’t hate on. They’ve completely transformed how software is deployed. Containers gained so much momentum it kind of outgrew them and they lost a lot of potential business. I would hardly call beginning to charge after a decade of free service a rug pull, especially now that dependence on Docker’s registry is shrinking all the time.
simlevesque 6 days ago|||
I don't hate them. But I don't want to depend on them for any product I manage.
verdverm 6 days ago|||
Have you checked out Dagger?

It's what the people who created OG Docker are building now

scoodah 6 days ago|||
Dagger is one of those things I want to like, but find incredibly painful to use in practice.
cedws 6 days ago||||
I have tried it but wasn't a fan. I tried to convert one of our Actions workflows and that proved to be a PITA that I gave up on. It seems now the project is pivoting into AI stuff.
nickstinemates 6 days ago|||
Well, one of them.
politelemon 6 days ago||||
Given the wealth and productivity creation that they're responsible for enabling across the industry, they deserve to be paid for it. There is no way for them to have achieved this with zero friction.
acdha 6 days ago||
I totally support companies charging for things which cost money to make but I think the strategy of saying something is free and later reneging is a very risky strategy. You’ll get some license sales after cold-calling people’s bosses or breaking builds but they won’t thank you for it.
immibis 6 days ago||||
It's the only rational way for a company to behave. Nonetheless you said it was free for 10 years. Many entire companies started and died within 10 years and had the benefit of the free registry the entire time. If you avoid doing something because it might change 10 years later, you'll never get anything done.
seemaze 6 days ago||||
Feels like they're trying to put the cat back in the bag and recoup a fraction of the exodus from the registry thing.
pploug 6 days ago||||
Projects are not charged for hub usage
skyline879 6 days ago|||
When was this?
imglorp 6 days ago|||
> 100 pulls per 6 hours for unauthenticated users and 200 pulls per 6 hours for Docker Personal users

Not a problem for casual users but even a small team like mine, a dozen people with around a dozen public images, can hit the pull limit deploying a dozen landscapes a day. We just cache all the public images ourselves and avoid it.

https://www.docker.com/blog/revisiting-docker-hub-policies-p...

nunez 6 days ago|||
It becomes a problem if you're testing something in local Kubernetes clusters that are ephemeral
staticassertion 6 days ago|||
That's for unauthenticated users. Just log in?
simlevesque 6 days ago|||
https://www.docker.com/developers/free-team-faq/

> Is Docker sunsetting the Free Team plan?

> No. Docker communicated its intent to sunset the Docker Free Team plan on March 14, 2023, but this decision was reversed on March 24, 2023.

pploug 6 days ago||
For oss projects with heavy pulls, the (free) dsos programme removes all rate limits on their public images, the intention was never to impact projects, but rather mega corporations using hub as free hosting:

https://www.docker.com/community/open-source/application/

dudeWithAMood 6 days ago|||
I am a little confused because I got a 401 when I tried to pull an image from there. Do I need a login or something? For a free image it sure doesn't feel that way.
seanieb 6 days ago||
Yeah, and my docker.com creds don't work.
yjftsjthsd-h 6 days ago|||
> No reason not to use them.

There's an excellent reason: They're login gated, which is at best unnecessary friction. Took me straight from "oh, let me try it" to "nope, not gonna bother".

nathanchou 6 days ago|||
CEO of VulnFree here.

Docker is just grasping at straws. Chainguard is worth more than Docker. This is just a marketing plot (and it's clearly working given the number of devs messaging me).

darkwater 6 days ago||
This smells like LLM generated
tecleandor 6 days ago|
Is this the response to the Bitnami/VMWare/Broadcom Helm charts thing?
jacques_chester 6 days ago||
My guess is that it's a response to "Chainguard are growing so fast that VCs have fought each other to give them hundreds of millions in 3 years despite having no AI play".
wilkommen 5 days ago|||
What is the Bitnami/VMWare/Broadcom Helm charts thing?
nunez 6 days ago||
Yes IMO
More comments...