Egregoros

Signal feed

Timeline

Post

Remote status

Replies

29

@sun docker is theoretically fine as development container thingy like it was intended to.

developers took the chance and decided "works on my docker" is now fine which makes for incredibly brittle software.

docker a bit like fentanyl, sometimes it might theoretically be the correct thing to administer but the big picture effects of it existing warrant complete opposition.

@sun @meowski Containers provide little isolation anyway. It's more of a "feel better" security than anything else. If you fear bad code might go sideways, your only solution is a VM really, unless you want to make a compromise and jump into the rabbit hole called SELinux.
@sun @meowski Container escapes are like a yearly thing both for Docker and Podman. And with Docker it's even more dangerous as everything runs usually under root. Few months ago three different container escapes for podman dropped from how it handled bind-mounting files, which also included an LSM bypass.
@mirq @meowski @sun If your distro has podman packaged, just use that. No stupid daemon required and rootless by default. If you create a new user account and start the container in it, it can also generate you a systemd user service file, which you can then enable and systemd will handle it for you (lingering enabled for the user account is required).