Security for Proxmox CT?

KHosting

Member
Mar 13, 2016
27
0
21
What are the best security measure for ensuring that CT are well contained and the users does not have access to the main node or other containers.

I understand setting the CT as 'unprivileged' would help a great deal but I was wondering if there are other best practises especially based on experience from those who might have used CT in production.
 
The thing is, if you really want to have the best available security, don't use LXC, use KVM instead.

Privileged means that the root in your container is an ordinary user on the host.
 
The thing is, if you really want to have the best available security, don't use LXC, use KVM instead.

True that, but there are IaaS businesses built entirely on containers like LXC. It seem to be there has to be a way to ensure they are secure and "fully contained" from a security perspective.

It will be good to know how they do it. That is what I am seeking to understand.
 
It will be good to know how they do it. That is what I am seeking to understand.

Ask them :-D
LXC states that everything else than unprivileged should not be used : https://linuxcontainers.org/lxc/security/

It is by-design that LX(C) containers cannot be as secure as a whole VM, because they share something (kernel, io etc.) and therefore lack the separation provided by share-nothing KVM, in which you have to emulate everything including a guest kernel. Any flaw that is found in the architecture or kernel is directly usable by malicious code on every container.