Network Requirements

Using Chainguard Images and Enforce with firewalls, access control lists, and proxies

This document provides an overview of network requirements for using Chainguard Images. To use Chainguard tools and Images in environments with firewalls, VPNs, and IDS/IPS systems, you will need to add some rules to allow traffic into and out of your networks.

Chainguard Images do not call Chainguard services while running, so no network changes would be required to the runtime environment. Review the Notes column for more info on each Hostname.

Chainguard Images Hosts

This table lists the DNS hostnames, associated ports, and protocols that will need to be allowed through firewalls and proxies to use Chainguard Images:

HostnamePortProtocolNotes
cgr.dev443HTTPSMain image registry
console.enforce.dev443HTTPSChainguard dashboard
console-api.enforce.dev443HTTPSRegistry API endpoint
enforce.dev443HTTPSRegistry authentication
dl.enforce.dev443HTTPSchainctl downloads
issuer.enforce.dev443HTTPSRegistry STS (Security Token Service)
packages.wolfi.dev443HTTPSPackage repository (Developer Images)
packages.cgr.dev443HTTPSPackage repository (Production Images)

Chainguard Images Third-party Hosts

This table lists the third-party DNS hostnames, associated ports, and protocols that will need to be allowed through firewalls and proxies to use Chainguard Images:

HostnamePortProtocolNotes
ghcr.io443HTTPSUsed for wolfi development
*.r2.cloudflarestorage.com443HTTPSBlob storage for cgr.dev
9236a389bd48b984df91adc1bc924620.r2.cloudflarestorage.com443HTTPSBlob storage for cgr.dev
chainguardhelp.zendesk.com443HTTPSSupport access for customers
storage.googleapis.com443HTTPSchainctl downloads

You can use either the single 9236a389bd48b984df91adc1bc924620.r2.cloudflarestorage.com host or the wildcard *.rc.cloudflarestorage.com hostname in your firewall and proxy configurations. However, the 9236a389bd48b984df91adc1bc924620.r2.cloudflarestorage.com hostname may change at some point in the future.

Ingress and Egress

Connections to the hosts listed on this page are generally initiated as new outbound connections. If you are using stateful firewall rules, then you will need to add symmetric rules to ensure that traffic flows correctly.

You will need egress rules that allow new traffic to the hosts listed here. You will need corresponding ingress rules that allow related and established traffic.

DNS Records and TTLs

Many of the hosts listed on this page use multiple DNS A records or CNAME aliases. Additionally, many A records have a short time to live of 60 seconds, and the majority are less than an hour (3600s).

If your network filters traffic based on IP addresses, ensure that any firewalls update their rules at an appropriate interval to match the TTL for each DNS record.

Last updated: 2024-03-28 15:22