Selfhosted
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.
Rules:
-
Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.
-
No spam posting.
-
Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.
-
Don't duplicate the full text of your blog or github here. Just post the link for folks to click.
-
Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).
-
No trolling.
Resources:
- selfh.st Newsletter and index of selfhosted software and apps
- awesome-selfhosted software
- awesome-sysadmin resources
- Self-Hosted Podcast from Jupiter Broadcasting
Any issues on the community? Report it using the report flag.
Questions? DM the mods!
view the rest of the comments
Don't run docker, so far it has proven quite insecure, and that was by design at first because docker was created for development environments and not for deployment.
Later docker added better security, because they understood the value in deployment too. But many distro are still insecure by default and it takes both the effort of sysadmins and image developers to deploy securely docker containers.
I switched to Podman: no daemon, no socket, no root operations out of the box. And the transition is basically seamless too.
I believe podman and containerd use
runc
under the hood so they're also affected by this container escape vulnerability. You should update it to the latest version.Podman can use different tools under the hood, will check which one I am using.
I think on redhat/fedora it uses runc by default and on debian/arch it uses crun by default.
I think on redhat/fedora it uses runc by default and on debian/arch it uses crun by default.