@theorytoe

1. i'm using docker
2. i don't use "the cures"
3. nobody "suppresses" ftp

you're retarded

@mk @theorytoe you missed the point. containers just make things harder. they are nice rube goldberg machines for shit languages like python which are hell to deploy.

when just installing everything from packages, things will receive timely security patches of the distribution.

when using VMs, one has to upgrade a few VMs for this. not great, not terrible.

with containers one has to hope that some image down the stack will be upgraded to include the fix, while the whole setup provides worse isolation than VMs (which already is prone to leakage). with containers the isolation is essentially the same as for plain linux users and chroot. no improvement. cgroups limiting resource usage can be set by the init system, i think systemd does this already.

containers sure have their use case, but mostly they are a crappy solution waiting for problems.

in the end the image is a meme which makes the point that ftp-ing a directory full of php scripts worked better than all the modern shit.

@bonifartius @theorytoe

im running a proxmox server with 2 virtual machines (pfsense and docker).

my docker vm hosts these services:

openldap
nextcloud
peertube 1
peertube 2
mastodon
hedgedoc
gogs
excalidraw
elk_cluster
searx
lightning network daemon (testnet)
lightning network daemon (mainnet)
bitcoin fullnode
bitcoin mempool stats
wordpress
mailcow emailserver

mastodon.satoshishop.de/@mk/11

@bonifartius @theorytoe

your solution is to..what?

run everything in their own VM? -> ressource nightmare
run everything on one host (without container)? -> security nightmare

bro..you're retarded.

@mk @theorytoe
- vms can use dynamic allocation for years now.
- containers provide absolutely no additional security.

running on the host is perfectly fine. it only requires one to know what one is doing, of course.

lastly, i'd be careful to calling other people retard when using "bro".

@bonifartius @theorytoe

"containers provide absolutely no additional security"

then it would be pretty easy for you to proof your statement? i'm waiting.

@mk @bonifartius @theorytoe Systemd does everything already, look at a random NixOS module that configures it.

I've had it with these docker faggots

@RGBCube @theorytoe @bonifartius

you guys are pretty good at talking and pretty shitty at linking to your sources.

@RGBCube @theorytoe @bonifartius

the position you're defeding is this:

"containers provide absolutely no additional security"

please provide evidence for this claim.

@mk @theorytoe @bonifartius Systemd already has cgroups, choosing and protecting kernel modules and anything related to the kernel. You don't need d*cker, as systemd already has EVERYTHING. And you optionally give access to specific ports so it can function properly.

Depends on what you mean containerization, but systemd already does it, ignoring the port usage.

@RGBCube @theorytoe @bonifartius

ok..to make it even simpler for you..

- there's a webservice running.
- it gets hacked.
- the hacker owns the webservice (the process)

is it harder or easier for the attacker to own the host system if..

scenario 1: process is isolated from the host system via cgroups and namespaces.

scenario 2: process is NOT isolated from the host system via cgroups and namespaces.

@mk @theorytoe @bonifartius Systemd is also scenario 1, if you do it properly. Which is done here

@RGBCube @theorytoe @bonifartius

bro...nobody is talking about your faggot systemd..

this is the position you retards took:

"containers provide absolutely no additional security"

please defend it or lose this debate.

@mk @RGBCube @theorytoe
i have to do some drywall now, so i'll keep it short:

- namespaces are a copy of a plan9 idea to have composable environments, isolation is a side effect.

- cgroups limit resource usage, might be worthwhile to prevent some daemon going crazy. otoh there already were things in place for that like umask.

- chroot is no "container feature". postfix chroots by default, so do many other daemons. you still need good user/group structure and appropriately set permissions in any case.

all of these things are usable without resorting to docker. @RGBCube explained how a distribution can use the same features with it's packages.

side note: you using words like "retard" and "faggot" while shilling docker which frequently has pride events borders on the comedic.

@bonifartius @RGBCube @theorytoe

are these two technologies making a operating system saver from a hijacked/hacked process?

yes or no.

- namespaces are a copy of a plan9 idea to have composable environments, isolation is a side effect.

- cgroups limit resource usage, might be worthwhile to prevent some daemon going crazy. otoh there already were things in place for that like umask.

@bonifartius

to make it short, because you'll never admit it anyway..

yes they do.

so you lost this position:

"containers provide absolutely no additional security"

@RGBCube @theorytoe

@mk @RGBCube @theorytoe
> unilaterally declares victory due to made up facts

bless your heart

i described pretty well what the things involved do and what they were made for. @RGBCube explained that they are in use by distribution packages.

i can't keep you from using fluoridated stuff like docker or proxmox. maybe it's one of these things in life one has to learn the hard way :blobcatshrug:

@bonifartius @mk @theorytoe Can't wait until they go bald by trying to migrate proxmox to something else when that goes out of fashion.
Follow

@RGBCube @theorytoe @mk just getting out data when something in the rube goldberg machinery will inevitably break will be hell enough :)

Sign in to participate in the conversation
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.