• 1 Post
  • 17 Comments
Joined 1 year ago
cake
Cake day: June 28th, 2023

help-circle



  • I mostly know what they do for a living. I am not really sure how old they are or what are their birthdays. But it simply isnt relevant.

    I had my bachelor’s party weekend last weekend, and my best man rented an airbnb. We were 9 guys and some of them did not know each other before. Doesnt matter, we had beer and a great time. I think, such details really dont matter, if not for small talk.







  • Indeed. Sure, they have these features, but only if used correctly while introducing vast more complexity (especially when being executed in a k8s environment,but also executed in plain docker). But, you know what also has security when used correctly? Plain linux.

    What about 90% of all images on docker hub executing their main payload as root? What about many images bundling unnecessary software like an init system? What about the fact that even if you rm something in a dockerfile, it is still present, if you execute the rm in a different RUN command? What about every user in the docker group being implicit root on the host since they simply can mount the host’s / inside their container? What about the reusing of layers between images like it is even intended?

    Doesnt sound like a security tool, does it? Sure, it feels a bit like one, but it was never intended to be one, but a dependency and environment bundling tool which happens to use certain linux APIs which can be used for security. But it wraps lots of abstraction around it.

    If you want to use these features for security, access them manually. But, OP said they are kind of a noob. Telling them to just use containers is dangerous and leads to false assumptions.

    Source: i work as a cloud/container/devops/k8s expert for over 5 years.