Bug 1810053

Summary: Proposed registries.conf for container-tools-rhel8-8.2.0
Product: Red Hat Enterprise Linux 8 Reporter: Jindrich Novy <jnovy>
Component: skopeoAssignee: Jindrich Novy <jnovy>
Status: CLOSED ERRATA QA Contact: atomic-bugs <atomic-bugs>
Severity: unspecified Docs Contact: Gabriela Nečasová <gnecasov>
Priority: unspecified    
Version: 8.1CC: ddarrah, dornelas, jwboyer, lmanasko, tsweeney, yujiang
Target Milestone: rc   
Target Release: 8.2   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: skopeo-0.1.40-10.el8 Doc Type: Enhancement
Doc Text:
.The default registries search list in `/etc/containers/registries.conf` has been updated The default `registries.search` list in `/etc/containers/registries.conf` has been updated to only include trusted registries that provide container images curated, patched, and maintained by Red Hat and its partners. Red Hat recommends always using fully qualified image names including: * The registry server (full DNS name) * Namespace * Image name * Tag (for example `registry.redhat.io/ubi8/ubu:latest`) When using short names, there is always an inherent risk of spoofing For example, a user wants to pull an image named `foobar` from a registry and expects it to come from `myregistry.com`. If `myregistry.com` is not first in the search list, an attacker could place a different `foobar` image at a registry earlier in the search list. The user would accidentally pull and run the attacker image and code rather than the intended content. Red Hat recommends only adding registries which are trusted, that is registries which do not allow unknown or anonymous users to create accounts with arbitrary names. This prevents an image from being spoofed, squatted or otherwise made insecure.
Story Points: ---
Clone Of:
: 1810056 1810060 (view as bug list) Environment:
Last Closed: 2020-04-28 15:53:37 UTC Type: Enhancement
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1186913, 1734579, 1810056, 1810060    

Comment 14 errata-xmlrpc 2020-04-28 15:53:37 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2020:1650