hi,
the host's /proc and /sys are mounted with read and write privileges inside the container when the nesting option is enabled. so for the host this means the files in /proc and /sys can be written to by a process in that container with the nesting option enabled.
yes
that depends on what happens in the container, since it has write privileges it can overwrite files. but after a host reboot it should reset again.
the main thing to watch out with nesting is that if /proc and /sys can be written to by that container, then it is a security risk since a malicious user can interact with them to break out from the container to the host machine. therefore it's not recommended to enable this option in untrusted environments.
Just recently started looking into containers in Proxmox.
The nesting bit over here;
https://pve.proxmox.com/wiki/Linux_Container, is a bit lacking for my part.
"nesting=<boolean> (default = 0)
Allow nesting. Best used with unprivileged containers with additional id mapping. Note that this will expose procfs and sysfs contents of the host to the guest."
Not sure I quite understand your answer.
Nesting is disabled by default, so what is the advantage to enabling it in a trusted environment, eg in a home-LAN?
Why would you want to enable it at all, considering the security risks mentioned?
Also, what "additional id mapping" is meant above?
Update
Experimented a bit more.
I ran a pve-container with docker installed and installed some docker-containers in that.
If I disable nesting on the pve-container, the docker-containers won't start.
Not sure why this is, yet.