mirror of https://github.com/docker/docs.git
Update content_trust.md
Make it clear that DCT does not protect against layer tampering on the docker host.
This commit is contained in:
parent
0d5ded5d22
commit
27e529ce3e
|
@ -20,7 +20,7 @@ client-side or runtime verification of the integrity and publisher of specific
|
||||||
image tags.
|
image tags.
|
||||||
|
|
||||||
Through DCT, image publishers can sign their images and image consumers can
|
Through DCT, image publishers can sign their images and image consumers can
|
||||||
ensure that the images they use are signed. Publishers could be individuals
|
ensure that the images they pull are signed. Publishers could be individuals
|
||||||
or organizations manually signing their content or automated software supply
|
or organizations manually signing their content or automated software supply
|
||||||
chains signing content as part of their release process.
|
chains signing content as part of their release process.
|
||||||
|
|
||||||
|
@ -244,9 +244,9 @@ Engine Signature Verification prevents the following:
|
||||||
|
|
||||||
DCT does not verify that a running container’s filesystem has not been altered
|
DCT does not verify that a running container’s filesystem has not been altered
|
||||||
from what was in the image. For example, it does not prevent a container from
|
from what was in the image. For example, it does not prevent a container from
|
||||||
writing to the filesystem, once the container is running, nor does it prevent
|
writing to the filesystem, once the container is running. Moreover, it does not
|
||||||
the container’s filesystem from being altered on disk. DCT will also not prevent
|
prevent the image's filesystem from being altered on a docker host's disk. DCT
|
||||||
unsigned images from being imported, loaded, or created.
|
will also not prevent unsigned images from being imported, loaded, or created.
|
||||||
|
|
||||||
### Enabling DCT within the Docker Enterprise Engine
|
### Enabling DCT within the Docker Enterprise Engine
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue