This!I wonder if PVE users understand - with the feature to be this neatly integrated - what they are actually getting, from whom.
It doesn't matter though for people like the /r/homelab-Crowd, they won't listen to advice against trusting helper-acripts/turnkey-appilances or dockerfiles in any case.
at least it is a stable company (with its own interests of course)
This Problem is not pve-soecific though, lxd, truenas, unraid and incus have the same issues, which is more social than technical.
Yes. Both can be compromised and used for supply chain attacks.
So for me it doesn't really matter whether people download a template from turnkey or from proxmox or truenas Apps repository
The proxmox Integration makes deployment easier but it's not a reason people shouldn't be expected to do basic sysadmin work.
The same is true for "helper scripts" expect they are even less trustworthy in my book since they tend to break even when used as designed.
Truenas has "official" apps and the possibilty to install custom 3rd Party apps. Technically it's kubernetes up to 24.04 and docker-compose beginning with 24.10.I do not know much about TrueNAS, it might be true there.
Why? That you shouldn't trust a download from the Internet is common sense in serious system administration. Homelabbers will ignore it nontheless. In the end this will lead to more hellish helper scripts to remove the oh-so-annoying popup.Maybe a popup on first use?
Why? That you shouldn't trust a download from the Internet is common sense in serious system administration.
Homelabbers will ignore it nontheless.
In the end this will lead to more hellish helper scripts to remove the oh-so-annoying popup.
But as soon as I install a template I see that something is downloaded. And if I actually bothered to read the manual before (heresy to assume this I know!) I would find following:I always thought the "why" is obvious, because they supposedly care about their users, in this case the case is quite easy to be made - the fact turnkey appears to be a built-in feature does not even make it obvious the user is downloading anything.
Proxmox VE itself provides a variety of basic templates for the most common Linux distributions. They can be downloaded using the GUI or the pveam (short for Proxmox VE Appliance Manager) command-line utility. Additionally, TurnKey Linux container templates are also available to download.
( https://pve.proxmox.com/wiki/Linux_Container and https://pve.proxmox.com/pve-docs/chapter-pct.html )
I actually agree with the developers on it. Of course it's a security issue (like the cups-browsed root exploit published one month ago) but it's not a big deal if people follow best practice (same story as with cups-browsed). It's way overblown to call this a big issue that during boot firewall rules need some time to get active. Even home users should know better than attach their PVE server directly to the internet.This reminds me the argument I received in BZ about firewall that may not load host ruleset is not something to inform users about because those users who rely on it (or keep their 8006 open) are anyways somehow not caring about security, so why let them know.
This goes in both directions: If I don't want to pay for support I pay by being a pre-production tester. In my world this is a fair deal because I can't afford even the community subscription. Even If i had an subscription in the end securing my systems is my responsibility. If I attach a production server to the Internet with some third-party-software without any due dilligence or security measures in my dayjob I propably won't have to worry about this job sooner or later. And if I do this in my home lan and get owned I have nobody to blame but myself. It's not like some enduser software where you can't expect the users not to know how to secure their stuff: PVE is a software designed to be administrated by people who have at least some basic IT operations skills.I don't care for it, but it shows how much users do not matter to Proxmox, the very same users who are however good enough to be unpaid pre-production testers.
So according to the doc the official templates needs to be downloaded as well as the TKL templates. For me the wording is enough to show, that although the download was integrated for easier deployment it's from a third party and should be trusted like any third party application (e.G: First check what's actually in it, then hit "download").
Now I know many people (myself included) doesn't read manuals but play around first.
I don't think that this will change, if this feature will be removed (because then even more homelabbers will go the road to hell aka hel(l)per scripts) or another popup is displayed.
it's not a big deal if people follow best practice
It's way overblown to call this a big issue that during boot firewall rules need some time to get active.
Even home users should know better than attach their PVE server directly to the internet.
This goes in both directions: If I don't want to pay for support I pay by being a pre-production tester.
In my world this is a fair deal because I can't afford even the community subscription.
If I attach a production server to the Internet with some third-party-software without any due dilligence or security measures in my dayjob I propably won't have to worry about this job sooner or later.
And if I do this in my home lan and get owned I have nobody to blame but myself. It's not like some enduser software where you can't expect the users not to know how to secure their stuff: PVE is a software designed to be administrated by people who have at least some basic IT operations skills.
I don't think it's a good idea for such software to hold hands with users who don't bother to learn these skills.
Not if it's one-off. BTW The same would be applicable to the "nag" popup that serves no purpose but puts users at risk.
There's no best practice on security published by Proxmox, whatsoever.
It's a reminder for users to tell them, that although PVE is available free of cost, it's development needs to be funded somehow and that running without subscription won't get support.
To remind users that in the end somebody needs to pay the bills is not evil but just business as usual.
Yes and this is fine in my book since best practices for Linux (or any os) system administration applies too.
If I recall correctly they used to have the possibility to donate to the project. They removed it since they didn't get any donations through it so now they are sticking with their subscription options. I don't know the finances of Proxmox Server Solutions GmbH but I think it's a save bet to assume that they (like any company not owned by a rich benefactor) need to make money to continue their business. The nag screen is as "unethical" as in several shareware which is free to distribute and use but will nag you to pay regulary.The lowest tier subscription does not even provide any support. It is a strange argument to make that Proxmox is dependent on these $10 a month subscriptions and at the same time that PVE is designed for professionals and thus needs not to care for their own users.
To keep the popup there permanently and:
1) knowing that lots of users will be applying dubious patches; and
2) virtue signalling of the product being free license; and
It certainly made me change my own attitude when someone asks for how to remove the popup here. Initially I used to say "it's a bit in bad taste to ask on this forum", but now I would actively discourage anyone from getting the Community tier.
If I recall correctly they used to have the possibility to donate to the project.
The nag screen is as "unethical" as in several shareware which is free to distribute and use but will nag you to pay regulary.
So yes If you want to get rid of the nag screen without dubiuous patches you will need to pay the lowest tier.
The licence is free, so I don't see any "virtue signalling".
you can start a fork immediately and nobody can do anything about it
You do this since some other weirdo from the internet without any connections to Proxmox Server Solutions GmbH (me) disagrees with you?
We use essential cookies to make this site work, and optional cookies to enhance your experience.