-
Based on this discussion, @rhatdan stated that But is the isolation in a unique UserNS as secure as running podman from an unprivileged user? |
Beta Was this translation helpful? Give feedback.
Replies: 6 comments 39 replies
-
It is actually more secure. If you run two containers as a rootless user, they run in the same user namespace so they can attack each other from a User Namespace point of view. If you run two containers as root with podman run --userns auto, then they run in unigue user namespace and are isolated. Rootless containers are great for containers run by users on a system, but if you are just running containers on a server, then --userns=auto is a more secure solution. (I plan on writing a blog on this). |
Beta Was this translation helpful? Give feedback.
-
Can you please remember to write a short blog post stating that a rootful podman is safer than a rootless podman? I'm really struggling to convince other users of this. Maybe a short notice in the README would be enough? |
Beta Was this translation helpful? Give feedback.
-
One thing related to this...what would I think be quite cool is integration with systemd |
Beta Was this translation helpful? Give feedback.
-
@rhatdan, were you ever able to write the blog post above regarding the security implications of rootfull podman as potentially more secure vs rootless? I'd love to read it if you can share a link. Thank you! |
Beta Was this translation helpful? Give feedback.
-
Hello, what's the best practice here nowadays? I'm currently deploying containerized services creating a dedicated non-root user on my system per "pod". Enable lingering and running the container within that dedicated user in rootless mode. How does it look? Would it be better to run them instead with |
Beta Was this translation helpful? Give feedback.
-
I was very excited at the thought of not creating a user per pod but I am running into a problem if I run
and maybe I need to read more about how this all works, but I tried setting subuid's and subgid's for the user 'container', that did nothing, I tried doing it for root and then realized root already had a lot. I tried running the command without sudo, that worked. I was hoping to have an uncomplicated and secure way to have multiple admins be able to tinker with containers and this seemed to be that promise. If i could get it going.... |
Beta Was this translation helpful? Give feedback.
It is actually more secure. If you run two containers as a rootless user, they run in the same user namespace so they can attack each other from a User Namespace point of view.
If you run two containers as root with podman run --userns auto, then they run in unigue user namespace and are isolated.
Rootless containers are great for containers run by users on a system, but if you are just running containers on a server, then --userns=auto is a more secure solution. (I plan on writing a blog on this).