Network Requirements for Chainguard Images

Using Chainguard Images with firewalls, access control lists, and proxies

Chainguard ImagesProductReference

This document provides an overview of network requirements for using Chainguard Images. To use Chainguard Images in environments with firewalls, VPNs, and IDS/IPS systems, you will need to add some rules to allow traffic into and out of your networks.

Chainguard Hosts

This table lists the DNS hostnames, associated ports, and protocols that will need to be allowed through firewalls and proxies to use Chainguard Images:

HostnamePortProtocolNotes
cgr.dev443HTTPSMain image registry
packages.wolfi.dev443HTTPSPackage repository

Third-party Hosts

This table lists the third-party DNS hostnames, associated ports, and protocols that will need to be allowed through firewalls and proxies to use Chainguard Images:

HostnamePortProtocolNotes
ghcr.io443HTTPSUsed for wolfi development
*.r2.cloudflarestorage.com443HTTPSBlob storage for cgr.dev

DNS Records and TTLs

Many of the hosts listed on this page use multiple DNS A records or CNAME aliases. Additionally, many A records have a short time to live of 60 seconds, and the majority are less than an hour (3600s).

If your network filters traffic based on IP addresses, ensure that any firewalls update their rules at an appropriate interval to match the TTL for each DNS record.