Run the Docker daemon as a non-root user (Rootless mode)
Estimated reading time: 7 minutesRootless mode allows running the Docker daemon and containers as a non-root user, for the sake of mitigating potential vulnerabilities in the daemon and the container runtime.
Rootless mode does not require root privileges even for installation of the Docker daemon, as long as the prerequisites are satisfied.
Rootless mode was introduced in Docker Engine 19.03.
Note: Rootless mode is an experimental feature and has limitations.
How it works
Rootless mode executes the Docker daemon and containers inside a user namespace.
This is very similar to userns-remap mode, except that
with userns-remap mode, the daemon itself is running with root privileges, whereas in
rootless mode, both the daemon and the container are running without root privileges.
Rootless mode does not use binaries with SETUID bits or file capabilities,
except newuidmap and newgidmap, which are needed to allow multiple
UIDs/GIDs to be used in the user namespace.
Prerequisites
-
newuidmapandnewgidmapneed to be installed on the host. These commands are provided by theuidmappackage on most distros. -
/etc/subuidand/etc/subgidshould contain at least 65,536 subordinate UIDs/GIDs for the user. In the following example, the usertestuserhas 65,536 subordinate UIDs/GIDs (231072-296607).
$ id -u
1001
$ whoami
testuser
$ grep ^$(whoami): /etc/subuid
testuser:231072:65536
$ grep ^$(whoami): /etc/subgid
testuser::231072:65536
Distribution-specific hint
Note: Using Ubuntu kernel is recommended.
Ubuntu
-
No preparation is needed.
-
overlay2storage driver is enabled by default (Ubuntu-specific kernel patch). -
Known to work on Ubuntu 16.04 and 18.04.
Debian GNU/Linux
-
Add
kernel.unprivileged_userns_clone=1to/etc/sysctl.conf(or/etc/sysctl.d) and runsudo sysctl --system. -
To use the
overlay2storage driver (recommended), runsudo modprobe overlay permit_mounts_in_userns=1(Debian-specific kernel patch, introduced in Debian 10). Put the configuration to/etc/modprobe.dfor persistence. -
Known to work on Debian 9 and 10.
overlay2is only supported since Debian 10 and needsmodprobeconfiguration described above.
Arch Linux
- Add
kernel.unprivileged_userns_clone=1to/etc/sysctl.conf(or/etc/sysctl.d) and runsudo sysctl --system
openSUSE
-
sudo modprobe ip_tables iptable_mangle iptable_nat iptable_filteris required. This might be required on other distros as well depending on the configuration. -
Known to work on openSUSE 15.
Fedora 31 and later
- Fedora 31 uses cgroup v2 by default, which is not yet supported by the containerd runtime.
Run
sudo grubby --update-kernel=ALL --args="systemd.unified_cgroup_hierarchy=0"to use cgroup v1.
Fedora 30
- No preparation is needed
CentOS 8
- No preparation is needed
CentOS 7
-
Add
user.max_user_namespaces=28633to/etc/sysctl.conf(or/etc/sysctl.d) and runsudo sysctl --system. -
systemctl --userdoes not work by default. Run the daemon directly without systemd:dockerd-rootless.sh --experimental --storage-driver vfs -
Known to work on CentOS 7.7. Older releases require extra configuration steps.
-
CentOS 7.6 and older releases require COPR package
vbatts/shadow-utils-newxidmapto be installed. -
CentOS 7.5 and older releases require running
sudo grubby --update-kernel=ALL --args="user_namespace.enable=1"and reboot.
Known limitations
-
Only
vfsgraphdriver is supported. However, on Ubuntu and Debian 10,overlay2andoverlayare also supported. - Following features are not supported:
- Cgroups (including
docker top, which depends on the cgroups) - AppArmor
- Checkpoint
- Overlay network
- Exposing SCTP ports
- Cgroups (including
-
To use
pingcommand, see Routing ping packets - To expose privileged TCP/UDP ports (< 1024), see Exposing privileged ports
Install
The installation script is available at https://get.docker.com/rootless.
$ curl -fsSL https://get.docker.com/rootless | sh
Make sure to run the script as a non-root user.
The script will show the environment variables that are needed to be set:
$ curl -fsSL https://get.docker.com/rootless | sh
...
# Docker binaries are installed in /home/testuser/bin
# WARN: dockerd is not in your current PATH or pointing to /home/testuser/bin/dockerd
# Make sure the following environment variables are set (or add them to ~/.bashrc):
export PATH=/home/testuser/bin:$PATH
export PATH=$PATH:/sbin
export DOCKER_HOST=unix:///run/user/1001/docker.sock
#
# To control docker service run:
# systemctl --user (start|stop|restart) docker
#
To install the binaries manually without using the installer, extract
docker-rootless-extras-<version>.tar.gz along with docker-<version>.tar.gz:
from [https://download.docker.com/linux/static/stable/x8664/](https://download.docker.com/linux/static/stable/x86_64/){: target=”_blank” class=”” }
Usage
Daemon
Use systemctl --user to manage the lifecycle of the daemon:
$ systemctl --user start docker
To launch the daemon on system startup, enable the systemd service and lingering:
$ systemctl --user enable docker
$ sudo loginctl enable-linger $(whoami)
To run the daemon directly without systemd, you need to run
dockerd-rootless.sh instead of dockerd:
$ dockerd-rootless.sh --experimental --storage-driver vfs
As Rootless mode is experimental, you need to run
dockerd-rootless.sh with --experimental.
You also need --storage-driver vfs unless using Ubuntu or Debian 10 kernel.
You don’t need to care about these flags if you manage the daemon using systemd, as
these flags are automatically added to the systemd unit file.
Remarks about directory paths:
- The socket path is set to
$XDG_RUNTIME_DIR/docker.sockby default.$XDG_RUNTIME_DIRis typically set to/run/user/$UID. - The data dir is set to
~/.local/share/dockerby default. - The exec dir is set to
$XDG_RUNTIME_DIR/dockerby default. - The daemon config dir is set to
~/.config/docker(not~/.docker, which is used by the client) by default.
Other remarks:
- The
dockerd-rootless.shscript executesdockerdin its own user, mount, and network namespaces. You can enter the namespaces by runningnsenter -U --preserve-credentials -n -m -t $(cat $XDG_RUNTIME_DIR/docker.pid). docker infoshowsrootlessinSecurityOptionsdocker infoshowsnoneasCgroup Driver
Client
You need to set the socket path explicitly.
$ export DOCKER_HOST=unix://$XDG_RUNTIME_DIR/docker.sock
$ docker run -d nginx
Tips
Rootless Docker in Docker
To run Rootless Docker inside “rootful” Docker, use docker:<version>-dind-rootless
image instead of docker:<version>-dind image.
$ docker run -d --name dind-rootless --privileged docker:19.03-dind-rootless --experimental
docker:<version>-dind-rootless image runs as a non-root user (UID 1000).
However, --privileged is required for disabling seccomp, AppArmor, and mount
masks.
Expose Docker API socket via TCP
To expose the Docker API socket via TCP, you need to launch dockerd-rootless.sh
with DOCKERD_ROOTLESS_ROOTLESSKIT_FLAGS="-p 0.0.0.0:2376:2376/tcp".
$ DOCKERD_ROOTLESS_ROOTLESSKIT_FLAGS="-p 0.0.0.0:2376:2376/tcp" \
dockerd-rootless.sh --experimental \
-H tcp://0.0.0.0:2376 \
--tlsverify --tlscacert=ca.pem --tlscert=cert.pem --tlskey=key.pem
Routing ping packets
ping command does not work by default.
Add net.ipv4.ping_group_range = 0 2147483647 to /etc/sysctl.conf (or
/etc/sysctl.d) and run sudo sysctl --system to allow using ping.
Exposing privileged ports
To expose privileged ports (< 1024), set CAP_NET_BIND_SERVICE on rootlesskit binary.
$ sudo setcap cap_net_bind_service=ep $HOME/bin/rootlesskit
Or add net.ipv4.ip_unprivileged_port_start=0 to /etc/sysctl.conf (or
/etc/sysctl.d) and run sudo sysctl --system.
Limiting resources
Currently, rootless mode ignores cgroup-related docker run flags such as
--cpus and memory.
However, traditional ulimit and cpulimit
can be still used, though they work in process-granularity rather than in container-granularity.
Changing network stack
dockerd-rootless.sh uses slirp4netns
(if installed) or VPNKit as the network stack
by default.
These network stacks run in userspace and might have performance overhead. See RootlessKit documentation for further information.
Optionally, you can use lxc-user-nic instead for the best performance.
To use lxc-user-nic, you need to edit /etc/lxc/lxc-usernet
and set $DOCKERD_ROOTLESS_ROOTLESSKIT_NET=lxc-user-nic.