Hi,
A question for security experts:
If I run docker (the traditional way, as root) in an unprivileged lxc - is that a security risk for the pve host?
My understanding is that running docker as root is, per se, a security risk. However, in an unprivileged lxc, the lxc's root (as which the docker daemon runs) is not an actual root on the pve host but rather a normal user with limited privileges. Thus, it would seem to me that this setup should not be overly unsafe.
Is this correct?
Would it still be a substantial security improvement to run docker rootless (where the docker app accepts that) or would that just be a lot of work for little security gain?
Thanks!
A question for security experts:
If I run docker (the traditional way, as root) in an unprivileged lxc - is that a security risk for the pve host?
My understanding is that running docker as root is, per se, a security risk. However, in an unprivileged lxc, the lxc's root (as which the docker daemon runs) is not an actual root on the pve host but rather a normal user with limited privileges. Thus, it would seem to me that this setup should not be overly unsafe.
Is this correct?
Would it still be a substantial security improvement to run docker rootless (where the docker app accepts that) or would that just be a lot of work for little security gain?
Thanks!