Egregoros

Signal feed

Timeline

Post

Remote status

Context

10
@sun @meowski Containers provide little isolation anyway. It's more of a "feel better" security than anything else. If you fear bad code might go sideways, your only solution is a VM really, unless you want to make a compromise and jump into the rabbit hole called SELinux.
@sun @meowski Container escapes are like a yearly thing both for Docker and Podman. And with Docker it's even more dangerous as everything runs usually under root. Few months ago three different container escapes for podman dropped from how it handled bind-mounting files, which also included an LSM bypass.

Replies

4
@mirq @meowski @sun If your distro has podman packaged, just use that. No stupid daemon required and rootless by default. If you create a new user account and start the container in it, it can also generate you a systemd user service file, which you can then enable and systemd will handle it for you (lingering enabled for the user account is required).