this post was submitted on 10 Jun 2023
24 points (96.2% liked)

Linux

48099 readers
874 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS
 

I've read that standard containers are optimized for developer productivity and not security, which makes sense.

But then what would be ideal to use for security? Suppose I want to isolate environments from each other for security purposes, to run questionable programs or reduce attack surface. What are some secure solutions?

Something without the performance hit of VMs

you are viewing a single comment's thread
view the rest of the comments
[–] dragnucs@lemmy.ml 13 points 1 year ago (18 children)

It is the application Docker that is not secure. Containers are. In fact Docker runs a daemon as root to wich you communicate from a client. This is what makes it less secure; running under root power. It also has a few shortcomings of privileged containers. This can be easily solved by using podman and SELinux. If you can manage to run Docker rootless, then you are magnitudes higher in security.

[–] boo@beehaw.org 3 points 1 year ago (1 children)

There can also be old images with e.g. old openssl versions being used. Its not a concern if they are updated frequently, but still manual.

[–] dragnucs@lemmy.ml 4 points 1 year ago (1 children)

This is a problem of the containerized program and the image itself. This problem affect, containers, VM, and baremetal aswel.

[–] boo@beehaw.org 2 points 1 year ago (1 children)

I agree. But imo these usecases are more known and mature in traditional setups, we could apt update and restart a systemd service and its done.

Its not so obvious and there are no mechanisms for containers/images.

(I am not into devops/sysadmin, so this might also be my lack of exposure)

[–] dragnucs@lemmy.ml 2 points 1 year ago (1 children)

Most often, images are updated automatically and are managed by the developers themselves so images are usually up to date. If you don't know how to build images, it may be difficult for you to update the containerized software before the vendor does. But this situation is infrequent.

[–] agressivelyPassive@feddit.de 1 points 1 year ago

Many projects just pull in a bunch of images from wherever and never update them. Especially if it's that one obscure image that happens to package this over obscure app you absolutely need.

load more comments (16 replies)