UFW isn’t part of the stack. UFW is just a front-end for configuring iptables. Docker will also interact with iptables to set up its networking.
The numerous Internet complaints about Docker “bypassing” UFW, or the “Docker + UFW security flaw”, are a misunderstanding of the Linux network security stack.
I used UFW in the context of the unified solution in the same way I use “Docker” to include the S6-executive which manages the processes within that container and establishes all the linkages to the outside world.
You’re showing your age there, old man. ipchains is out at the bar drinking well-aged whisky.
I follow your point. And my point isn’t to correct the terms, but truly to agree with you that it’s complicated. It’s easy to build a functional-but-imperfect mental approximation of how the systems work.
It’s reasonable to expect that UFW rules will apply. It’s wrong, because that’s not the whole story. But it’s not a bug in the system - there’s nothing wrong with UFW.
Obviously Plex shouldn’t amplify UDP packets, and of course people expect it to be secure by default. So of course Plex should provide an update.
Equally obviously, people should use network firewalls, and shouldn’t expose unnecessary hosts or services to the Internet. So of course safe behavior should be encouraged.
They’re both important. One doesn’t replace the other, because they’ll both always be imperfect.
I think Plex has struck a reasonable balance already - it’s easy to do common things securely, and it’s possible to do uncommon things. It’s reasonable to expect more expertise and responsibility for the uncommon things.
I really do not wish to get drawn into a legal discussion. I’d prefer this stay at the friendly technical level of “How to provide the best solution to all ?”
Friendly is assumed. Nope, nothing’s wrong with how you make the cars.
But I LOVE that analogy. Cars have gotten significantly safer.
If I crash into a pole, it’s my fault. I was going too fast for the conditions, and didn’t maintain safe control.
But my car has ABS, and stability assistance, and lane departure warnings, and blindspot monitoring, and speed limit warnings, and temperature alerts, and very good tires, and pre-collision braking.
It doesn’t drive for me, or stop me from crashing. But it gives me every possible advantage.
Perhaps a deer jumped in front of the car. Perhaps I was surprised by a flat tire.
I appreciate that the car makes it harder to drive into a pole, unless it’s deliberate. I’ll be very annoyed when I want to drive into a pole … and the car doesn’t allow me to do it.
There’s no way Plex can prevent people from deploying it “incorrectly” without also making it impossible to do reasonable things. I’m already annoyed by the baked-in private/RFC1918 restrictions.
But of course Plex is fixing the UDP amplification issue, even though it “should never” be configured that way.
All this fuss about firewalls and Docker and that folks aren’t coddled.
If folks want to be coddled, prevented from doing things which are known unsafe,
– go back to Windows. (Last I looked, Docker doesn’t run there )
All this codding is blocking what I know Linux can do for me. – Prime example. Turning off SSH tunnel ? SERIOUSLY? WTF DOC? (ssh -L xxxx:127.0.0.1:32400 ip.addr.of.host)
What I am saying is Netscout likely first learned about the plex server issue a few days ago, after the issue was already public for a month. “Responsible disclosure” is moot at this point.