TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Linux Containers, Docker, and Security

55 pointsby sylvainkalacheover 11 years ago

7 comments

tptacekover 11 years ago
Nothing here about crypto, and the risks of running crypto for two different applications on the same kernel (and with the same CSPRNG state) simultaneously.<p>&lt;snark&gt; But I&#x27;m sure if nobody&#x27;s talking about it on Reddit, that must mean it&#x27;s not a big deal. &lt;&#x2F;snark&gt; ;)
评论 #7162939 未加载
scarmigover 11 years ago
I am terrified of containers. In 2012 I used lxc-destroy on a container, and it managed to destroy my entire filesystem. It seems beyond belief to me that something like that could happen, but it did.<p>Definitely unfair to bring it up at this point--it was a while back--but until everyone universally says they&#x27;re solid, I&#x27;m not touching them.
评论 #7162900 未加载
评论 #7163264 未加载
评论 #7163621 未加载
评论 #7164398 未加载
评论 #7163160 未加载
stefanhaover 11 years ago
The presentation makes a good point that containers aren&#x27;t universally &quot;insecure&quot;.<p>For certain use cases they are absolutely fine because the trust boundary between containers or the kernel isn&#x27;t critical: * Deployment (immutable servers) * Development environment (develop against same configuration as production) * Test environment (try different distros)<p>But running multiple containers from untrusted parties on one host <i>is</i> risky. Let&#x27;s face it, kernel exploits do come out periodically and when that happens, container boundaries can be breached.<p>At the end of the day, security isn&#x27;t absolute. You need to consider how valuable your data is and make your own decision.
rwmjover 11 years ago
It&#x27;s worth noting that libvirt puts an (LXC) container around each regular KVM virtual machine it runs, and will also secure it using SELinux (see: sVirt).
natejenkinsover 11 years ago
Can someone comment on the current state of Namespaces in Linux and how that impacts LXC security? I found the following from 2012: <a href="http://lwn.net/Articles/528078/" rel="nofollow">http:&#x2F;&#x2F;lwn.net&#x2F;Articles&#x2F;528078&#x2F;</a>
评论 #7163805 未加载
Da_Blitzover 11 years ago
This is pretty much spot on based on my experience writing containers implementations. I have been putting together information documenting containers and just added some notes about security earlier.<p>At the moment i am taking my notes on how to secure containers and attempting to put them in a more digestible form unfortunately depending on what you are trying to do with containers the security model and how you defend those containers changes dramatically<p>if any one is interested in more info hit up <a href="http://doger.io" rel="nofollow">http:&#x2F;&#x2F;doger.io</a> and feel free to ask questions or request specific information be posted
w0rmover 11 years ago
Interesting to see this as just today I have decided to setup a new server with LXC.