1 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
2 |
DENIED
|
moderate
|
Proxies\__CG__\App\Entity\Entry {#1740
+user: Proxies\__CG__\App\Entity\User {#2372 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2130 …}
+slug: "How-do-I-create-a-docker-container-with-custom-programs"
+title: "How do I create a docker container with custom programs inside?"
+url: null
+body: """
Hello! I have a free account at hide.me and would like to try to use it with my docker compose containers. The free plan does not give me the keys for openVPN of Wireguard configuration, but only through the official client. I’d like then to create a docker container that runs the official hide.me client inside, and exposes it to other docker containers (like gluetun does, for instance). I’d also like to implement a killswitch or something like that to prevent ip leakage. Is this something easy-medium hard or something very complex? I already have a script that installs and runs the client to enable vpn that should be run at startup, but I miss the “expose the network interface” and the “do not expose it if not connected” (this last part I think is pretty easy with a basic firewall configuration)\n
\n
any tips/something already done? \n
thanks in advance!\n
\n
EDIT: probably crazy idea, but would it be possible to do this in gluetun?
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 11
+favouriteCount: 30
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1728784342 {#2460
date: 2024-10-13 03:52:22.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2140 …}
+votes: Doctrine\ORM\PersistentCollection {#2094 …}
+reports: Doctrine\ORM\PersistentCollection {#2090 …}
+favourites: Doctrine\ORM\PersistentCollection {#2327 …}
+notifications: Doctrine\ORM\PersistentCollection {#2328 …}
+badges: Doctrine\ORM\PersistentCollection {#2335 …}
+children: [
App\Entity\EntryComment {#1741
+user: App\Entity\User {#261 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1740 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: null
+parent: null
+root: null
+body: "Each container, by default, runs in a separate network namespace. You can use docker CLI to create specific networks that can be shared with other containers, or use docker-compose for it. Technically, for processes outside containers you can still use the same network of that container by running the inside the network namespace of the ‘VPN’ container (for example running them with unshare). However, I wouldn’t recommend this, as containers are supposed to run mostly isolated workload and not for this kind of use-case. But yeah, technically it’s feasible."
+lang: "en"
+isAdult: false
+favouriteCount: 7
+score: 0
+lastActive: DateTime @1706207127 {#1717
date: 2024-01-25 19:25:27.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@tubbadu@lemmy.kde.social"
]
+children: Doctrine\ORM\PersistentCollection {#1707 …}
+nested: Doctrine\ORM\PersistentCollection {#2464 …}
+votes: Doctrine\ORM\PersistentCollection {#2448 …}
+reports: Doctrine\ORM\PersistentCollection {#2447 …}
+favourites: Doctrine\ORM\PersistentCollection {#2462 …}
+notifications: Doctrine\ORM\PersistentCollection {#2461 …}
-id: 339958
-bodyTs: "'case':89 'cli':15 'compos':31 'contain':2,26,38,48,59,73 'creat':17 'default':4 'docker':14,30 'docker-compos':29 'exampl':61 'feasibl':95 'howev':66 'insid':52 'isol':79 'kind':85 'most':78 'namespac':10,55 'network':9,19,45,54 'outsid':37 'process':36 'recommend':70 'run':5,50,62,77 'separ':8 'share':23 'specif':18 'still':41 'suppos':75 'technic':34,92 'unshar':65 'use':13,28,42,88 'use-cas':87 'vpn':58 'workload':80 'wouldn':68 'yeah':91"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/7007733"
+editedAt: null
+createdAt: DateTimeImmutable @1706207127 {#1739
date: 2024-01-25 19:25:27.0 +01:00
}
+"title": 339958
}
]
-id: 33027
-titleTs: "'contain':7 'creat':4 'custom':9 'docker':6 'insid':11 'program':10"
-bodyTs: "'account':6 'advanc':153 'alreadi':98,149 'also':72 'basic':144 'client':41,56,107 'complex':96 'compos':20 'configur':35,146 'connect':133 'contain':21,50,64 'crazi':156 'creat':47 'd':43,71 'docker':19,49,63 'done':150 'easi':90,141 'easy-medium':89 'edit':154 'enabl':109 'expos':59,121,129 'firewal':145 'free':5,23 'give':27 'gluetun':66,167 'hard':92 'hello':1 'hide.me':8,55 'idea':157 'implement':75 'insid':57 'instal':103 'instanc':69 'interfac':124 'ip':84 'key':30 'killswitch':77 'last':135 'leakag':85 'like':11,44,65,73,80 'medium':91 'miss':119 'network':123 'offici':40,54 'openvpn':32 'part':136 'plan':24 'possibl':162 'pretti':140 'prevent':83 'probabl':155 'run':52,105,114 'script':101 'someth':79,88,94 'startup':116 'thank':151 'think':138 'tips/something':148 'tri':13 'use':15 'vpn':110 'wireguard':34 'would':10,159"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706287054
+visibility: "visible "
+apId: "https://lemmy.kde.social/post/722914"
+editedAt: null
+createdAt: DateTimeImmutable @1706200654 {#2360
date: 2024-01-25 17:37:34.0 +01:00
}
+__isInitialized__: true
…2
} |
|
Show voter details
|
3 |
DENIED
|
edit
|
Proxies\__CG__\App\Entity\Entry {#1740
+user: Proxies\__CG__\App\Entity\User {#2372 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2130 …}
+slug: "How-do-I-create-a-docker-container-with-custom-programs"
+title: "How do I create a docker container with custom programs inside?"
+url: null
+body: """
Hello! I have a free account at hide.me and would like to try to use it with my docker compose containers. The free plan does not give me the keys for openVPN of Wireguard configuration, but only through the official client. I’d like then to create a docker container that runs the official hide.me client inside, and exposes it to other docker containers (like gluetun does, for instance). I’d also like to implement a killswitch or something like that to prevent ip leakage. Is this something easy-medium hard or something very complex? I already have a script that installs and runs the client to enable vpn that should be run at startup, but I miss the “expose the network interface” and the “do not expose it if not connected” (this last part I think is pretty easy with a basic firewall configuration)\n
\n
any tips/something already done? \n
thanks in advance!\n
\n
EDIT: probably crazy idea, but would it be possible to do this in gluetun?
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 11
+favouriteCount: 30
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1728784342 {#2460
date: 2024-10-13 03:52:22.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2140 …}
+votes: Doctrine\ORM\PersistentCollection {#2094 …}
+reports: Doctrine\ORM\PersistentCollection {#2090 …}
+favourites: Doctrine\ORM\PersistentCollection {#2327 …}
+notifications: Doctrine\ORM\PersistentCollection {#2328 …}
+badges: Doctrine\ORM\PersistentCollection {#2335 …}
+children: [
App\Entity\EntryComment {#1741
+user: App\Entity\User {#261 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1740 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: null
+parent: null
+root: null
+body: "Each container, by default, runs in a separate network namespace. You can use docker CLI to create specific networks that can be shared with other containers, or use docker-compose for it. Technically, for processes outside containers you can still use the same network of that container by running the inside the network namespace of the ‘VPN’ container (for example running them with unshare). However, I wouldn’t recommend this, as containers are supposed to run mostly isolated workload and not for this kind of use-case. But yeah, technically it’s feasible."
+lang: "en"
+isAdult: false
+favouriteCount: 7
+score: 0
+lastActive: DateTime @1706207127 {#1717
date: 2024-01-25 19:25:27.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@tubbadu@lemmy.kde.social"
]
+children: Doctrine\ORM\PersistentCollection {#1707 …}
+nested: Doctrine\ORM\PersistentCollection {#2464 …}
+votes: Doctrine\ORM\PersistentCollection {#2448 …}
+reports: Doctrine\ORM\PersistentCollection {#2447 …}
+favourites: Doctrine\ORM\PersistentCollection {#2462 …}
+notifications: Doctrine\ORM\PersistentCollection {#2461 …}
-id: 339958
-bodyTs: "'case':89 'cli':15 'compos':31 'contain':2,26,38,48,59,73 'creat':17 'default':4 'docker':14,30 'docker-compos':29 'exampl':61 'feasibl':95 'howev':66 'insid':52 'isol':79 'kind':85 'most':78 'namespac':10,55 'network':9,19,45,54 'outsid':37 'process':36 'recommend':70 'run':5,50,62,77 'separ':8 'share':23 'specif':18 'still':41 'suppos':75 'technic':34,92 'unshar':65 'use':13,28,42,88 'use-cas':87 'vpn':58 'workload':80 'wouldn':68 'yeah':91"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/7007733"
+editedAt: null
+createdAt: DateTimeImmutable @1706207127 {#1739
date: 2024-01-25 19:25:27.0 +01:00
}
+"title": 339958
}
]
-id: 33027
-titleTs: "'contain':7 'creat':4 'custom':9 'docker':6 'insid':11 'program':10"
-bodyTs: "'account':6 'advanc':153 'alreadi':98,149 'also':72 'basic':144 'client':41,56,107 'complex':96 'compos':20 'configur':35,146 'connect':133 'contain':21,50,64 'crazi':156 'creat':47 'd':43,71 'docker':19,49,63 'done':150 'easi':90,141 'easy-medium':89 'edit':154 'enabl':109 'expos':59,121,129 'firewal':145 'free':5,23 'give':27 'gluetun':66,167 'hard':92 'hello':1 'hide.me':8,55 'idea':157 'implement':75 'insid':57 'instal':103 'instanc':69 'interfac':124 'ip':84 'key':30 'killswitch':77 'last':135 'leakag':85 'like':11,44,65,73,80 'medium':91 'miss':119 'network':123 'offici':40,54 'openvpn':32 'part':136 'plan':24 'possibl':162 'pretti':140 'prevent':83 'probabl':155 'run':52,105,114 'script':101 'someth':79,88,94 'startup':116 'thank':151 'think':138 'tips/something':148 'tri':13 'use':15 'vpn':110 'wireguard':34 'would':10,159"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706287054
+visibility: "visible "
+apId: "https://lemmy.kde.social/post/722914"
+editedAt: null
+createdAt: DateTimeImmutable @1706200654 {#2360
date: 2024-01-25 17:37:34.0 +01:00
}
+__isInitialized__: true
…2
} |
|
Show voter details
|
4 |
DENIED
|
moderate
|
Proxies\__CG__\App\Entity\Entry {#1740
+user: Proxies\__CG__\App\Entity\User {#2372 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2130 …}
+slug: "How-do-I-create-a-docker-container-with-custom-programs"
+title: "How do I create a docker container with custom programs inside?"
+url: null
+body: """
Hello! I have a free account at hide.me and would like to try to use it with my docker compose containers. The free plan does not give me the keys for openVPN of Wireguard configuration, but only through the official client. I’d like then to create a docker container that runs the official hide.me client inside, and exposes it to other docker containers (like gluetun does, for instance). I’d also like to implement a killswitch or something like that to prevent ip leakage. Is this something easy-medium hard or something very complex? I already have a script that installs and runs the client to enable vpn that should be run at startup, but I miss the “expose the network interface” and the “do not expose it if not connected” (this last part I think is pretty easy with a basic firewall configuration)\n
\n
any tips/something already done? \n
thanks in advance!\n
\n
EDIT: probably crazy idea, but would it be possible to do this in gluetun?
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 11
+favouriteCount: 30
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1728784342 {#2460
date: 2024-10-13 03:52:22.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2140 …}
+votes: Doctrine\ORM\PersistentCollection {#2094 …}
+reports: Doctrine\ORM\PersistentCollection {#2090 …}
+favourites: Doctrine\ORM\PersistentCollection {#2327 …}
+notifications: Doctrine\ORM\PersistentCollection {#2328 …}
+badges: Doctrine\ORM\PersistentCollection {#2335 …}
+children: [
App\Entity\EntryComment {#1741
+user: App\Entity\User {#261 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1740 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: null
+parent: null
+root: null
+body: "Each container, by default, runs in a separate network namespace. You can use docker CLI to create specific networks that can be shared with other containers, or use docker-compose for it. Technically, for processes outside containers you can still use the same network of that container by running the inside the network namespace of the ‘VPN’ container (for example running them with unshare). However, I wouldn’t recommend this, as containers are supposed to run mostly isolated workload and not for this kind of use-case. But yeah, technically it’s feasible."
+lang: "en"
+isAdult: false
+favouriteCount: 7
+score: 0
+lastActive: DateTime @1706207127 {#1717
date: 2024-01-25 19:25:27.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@tubbadu@lemmy.kde.social"
]
+children: Doctrine\ORM\PersistentCollection {#1707 …}
+nested: Doctrine\ORM\PersistentCollection {#2464 …}
+votes: Doctrine\ORM\PersistentCollection {#2448 …}
+reports: Doctrine\ORM\PersistentCollection {#2447 …}
+favourites: Doctrine\ORM\PersistentCollection {#2462 …}
+notifications: Doctrine\ORM\PersistentCollection {#2461 …}
-id: 339958
-bodyTs: "'case':89 'cli':15 'compos':31 'contain':2,26,38,48,59,73 'creat':17 'default':4 'docker':14,30 'docker-compos':29 'exampl':61 'feasibl':95 'howev':66 'insid':52 'isol':79 'kind':85 'most':78 'namespac':10,55 'network':9,19,45,54 'outsid':37 'process':36 'recommend':70 'run':5,50,62,77 'separ':8 'share':23 'specif':18 'still':41 'suppos':75 'technic':34,92 'unshar':65 'use':13,28,42,88 'use-cas':87 'vpn':58 'workload':80 'wouldn':68 'yeah':91"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/7007733"
+editedAt: null
+createdAt: DateTimeImmutable @1706207127 {#1739
date: 2024-01-25 19:25:27.0 +01:00
}
+"title": 339958
}
]
-id: 33027
-titleTs: "'contain':7 'creat':4 'custom':9 'docker':6 'insid':11 'program':10"
-bodyTs: "'account':6 'advanc':153 'alreadi':98,149 'also':72 'basic':144 'client':41,56,107 'complex':96 'compos':20 'configur':35,146 'connect':133 'contain':21,50,64 'crazi':156 'creat':47 'd':43,71 'docker':19,49,63 'done':150 'easi':90,141 'easy-medium':89 'edit':154 'enabl':109 'expos':59,121,129 'firewal':145 'free':5,23 'give':27 'gluetun':66,167 'hard':92 'hello':1 'hide.me':8,55 'idea':157 'implement':75 'insid':57 'instal':103 'instanc':69 'interfac':124 'ip':84 'key':30 'killswitch':77 'last':135 'leakag':85 'like':11,44,65,73,80 'medium':91 'miss':119 'network':123 'offici':40,54 'openvpn':32 'part':136 'plan':24 'possibl':162 'pretti':140 'prevent':83 'probabl':155 'run':52,105,114 'script':101 'someth':79,88,94 'startup':116 'thank':151 'think':138 'tips/something':148 'tri':13 'use':15 'vpn':110 'wireguard':34 'would':10,159"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706287054
+visibility: "visible "
+apId: "https://lemmy.kde.social/post/722914"
+editedAt: null
+createdAt: DateTimeImmutable @1706200654 {#2360
date: 2024-01-25 17:37:34.0 +01:00
}
+__isInitialized__: true
…2
} |
|
Show voter details
|
5 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
6 |
DENIED
|
moderate
|
App\Entity\EntryComment {#1741
+user: App\Entity\User {#261 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1740
+user: Proxies\__CG__\App\Entity\User {#2372 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2130 …}
+slug: "How-do-I-create-a-docker-container-with-custom-programs"
+title: "How do I create a docker container with custom programs inside?"
+url: null
+body: """
Hello! I have a free account at hide.me and would like to try to use it with my docker compose containers. The free plan does not give me the keys for openVPN of Wireguard configuration, but only through the official client. I’d like then to create a docker container that runs the official hide.me client inside, and exposes it to other docker containers (like gluetun does, for instance). I’d also like to implement a killswitch or something like that to prevent ip leakage. Is this something easy-medium hard or something very complex? I already have a script that installs and runs the client to enable vpn that should be run at startup, but I miss the “expose the network interface” and the “do not expose it if not connected” (this last part I think is pretty easy with a basic firewall configuration)\n
\n
any tips/something already done? \n
thanks in advance!\n
\n
EDIT: probably crazy idea, but would it be possible to do this in gluetun?
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 11
+favouriteCount: 30
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1728784342 {#2460
date: 2024-10-13 03:52:22.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2140 …}
+votes: Doctrine\ORM\PersistentCollection {#2094 …}
+reports: Doctrine\ORM\PersistentCollection {#2090 …}
+favourites: Doctrine\ORM\PersistentCollection {#2327 …}
+notifications: Doctrine\ORM\PersistentCollection {#2328 …}
+badges: Doctrine\ORM\PersistentCollection {#2335 …}
+children: [
App\Entity\EntryComment {#1741}
]
-id: 33027
-titleTs: "'contain':7 'creat':4 'custom':9 'docker':6 'insid':11 'program':10"
-bodyTs: "'account':6 'advanc':153 'alreadi':98,149 'also':72 'basic':144 'client':41,56,107 'complex':96 'compos':20 'configur':35,146 'connect':133 'contain':21,50,64 'crazi':156 'creat':47 'd':43,71 'docker':19,49,63 'done':150 'easi':90,141 'easy-medium':89 'edit':154 'enabl':109 'expos':59,121,129 'firewal':145 'free':5,23 'give':27 'gluetun':66,167 'hard':92 'hello':1 'hide.me':8,55 'idea':157 'implement':75 'insid':57 'instal':103 'instanc':69 'interfac':124 'ip':84 'key':30 'killswitch':77 'last':135 'leakag':85 'like':11,44,65,73,80 'medium':91 'miss':119 'network':123 'offici':40,54 'openvpn':32 'part':136 'plan':24 'possibl':162 'pretti':140 'prevent':83 'probabl':155 'run':52,105,114 'script':101 'someth':79,88,94 'startup':116 'thank':151 'think':138 'tips/something':148 'tri':13 'use':15 'vpn':110 'wireguard':34 'would':10,159"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706287054
+visibility: "visible "
+apId: "https://lemmy.kde.social/post/722914"
+editedAt: null
+createdAt: DateTimeImmutable @1706200654 {#2360
date: 2024-01-25 17:37:34.0 +01:00
}
+__isInitialized__: true
…2
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: null
+parent: null
+root: null
+body: "Each container, by default, runs in a separate network namespace. You can use docker CLI to create specific networks that can be shared with other containers, or use docker-compose for it. Technically, for processes outside containers you can still use the same network of that container by running the inside the network namespace of the ‘VPN’ container (for example running them with unshare). However, I wouldn’t recommend this, as containers are supposed to run mostly isolated workload and not for this kind of use-case. But yeah, technically it’s feasible."
+lang: "en"
+isAdult: false
+favouriteCount: 7
+score: 0
+lastActive: DateTime @1706207127 {#1717
date: 2024-01-25 19:25:27.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@tubbadu@lemmy.kde.social"
]
+children: Doctrine\ORM\PersistentCollection {#1707 …}
+nested: Doctrine\ORM\PersistentCollection {#2464 …}
+votes: Doctrine\ORM\PersistentCollection {#2448 …}
+reports: Doctrine\ORM\PersistentCollection {#2447 …}
+favourites: Doctrine\ORM\PersistentCollection {#2462 …}
+notifications: Doctrine\ORM\PersistentCollection {#2461 …}
-id: 339958
-bodyTs: "'case':89 'cli':15 'compos':31 'contain':2,26,38,48,59,73 'creat':17 'default':4 'docker':14,30 'docker-compos':29 'exampl':61 'feasibl':95 'howev':66 'insid':52 'isol':79 'kind':85 'most':78 'namespac':10,55 'network':9,19,45,54 'outsid':37 'process':36 'recommend':70 'run':5,50,62,77 'separ':8 'share':23 'specif':18 'still':41 'suppos':75 'technic':34,92 'unshar':65 'use':13,28,42,88 'use-cas':87 'vpn':58 'workload':80 'wouldn':68 'yeah':91"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/7007733"
+editedAt: null
+createdAt: DateTimeImmutable @1706207127 {#1739
date: 2024-01-25 19:25:27.0 +01:00
}
+"title": 339958
} |
|
Show voter details
|
7 |
DENIED
|
edit
|
App\Entity\EntryComment {#1741
+user: App\Entity\User {#261 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1740
+user: Proxies\__CG__\App\Entity\User {#2372 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2130 …}
+slug: "How-do-I-create-a-docker-container-with-custom-programs"
+title: "How do I create a docker container with custom programs inside?"
+url: null
+body: """
Hello! I have a free account at hide.me and would like to try to use it with my docker compose containers. The free plan does not give me the keys for openVPN of Wireguard configuration, but only through the official client. I’d like then to create a docker container that runs the official hide.me client inside, and exposes it to other docker containers (like gluetun does, for instance). I’d also like to implement a killswitch or something like that to prevent ip leakage. Is this something easy-medium hard or something very complex? I already have a script that installs and runs the client to enable vpn that should be run at startup, but I miss the “expose the network interface” and the “do not expose it if not connected” (this last part I think is pretty easy with a basic firewall configuration)\n
\n
any tips/something already done? \n
thanks in advance!\n
\n
EDIT: probably crazy idea, but would it be possible to do this in gluetun?
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 11
+favouriteCount: 30
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1728784342 {#2460
date: 2024-10-13 03:52:22.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2140 …}
+votes: Doctrine\ORM\PersistentCollection {#2094 …}
+reports: Doctrine\ORM\PersistentCollection {#2090 …}
+favourites: Doctrine\ORM\PersistentCollection {#2327 …}
+notifications: Doctrine\ORM\PersistentCollection {#2328 …}
+badges: Doctrine\ORM\PersistentCollection {#2335 …}
+children: [
App\Entity\EntryComment {#1741}
]
-id: 33027
-titleTs: "'contain':7 'creat':4 'custom':9 'docker':6 'insid':11 'program':10"
-bodyTs: "'account':6 'advanc':153 'alreadi':98,149 'also':72 'basic':144 'client':41,56,107 'complex':96 'compos':20 'configur':35,146 'connect':133 'contain':21,50,64 'crazi':156 'creat':47 'd':43,71 'docker':19,49,63 'done':150 'easi':90,141 'easy-medium':89 'edit':154 'enabl':109 'expos':59,121,129 'firewal':145 'free':5,23 'give':27 'gluetun':66,167 'hard':92 'hello':1 'hide.me':8,55 'idea':157 'implement':75 'insid':57 'instal':103 'instanc':69 'interfac':124 'ip':84 'key':30 'killswitch':77 'last':135 'leakag':85 'like':11,44,65,73,80 'medium':91 'miss':119 'network':123 'offici':40,54 'openvpn':32 'part':136 'plan':24 'possibl':162 'pretti':140 'prevent':83 'probabl':155 'run':52,105,114 'script':101 'someth':79,88,94 'startup':116 'thank':151 'think':138 'tips/something':148 'tri':13 'use':15 'vpn':110 'wireguard':34 'would':10,159"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706287054
+visibility: "visible "
+apId: "https://lemmy.kde.social/post/722914"
+editedAt: null
+createdAt: DateTimeImmutable @1706200654 {#2360
date: 2024-01-25 17:37:34.0 +01:00
}
+__isInitialized__: true
…2
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: null
+parent: null
+root: null
+body: "Each container, by default, runs in a separate network namespace. You can use docker CLI to create specific networks that can be shared with other containers, or use docker-compose for it. Technically, for processes outside containers you can still use the same network of that container by running the inside the network namespace of the ‘VPN’ container (for example running them with unshare). However, I wouldn’t recommend this, as containers are supposed to run mostly isolated workload and not for this kind of use-case. But yeah, technically it’s feasible."
+lang: "en"
+isAdult: false
+favouriteCount: 7
+score: 0
+lastActive: DateTime @1706207127 {#1717
date: 2024-01-25 19:25:27.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@tubbadu@lemmy.kde.social"
]
+children: Doctrine\ORM\PersistentCollection {#1707 …}
+nested: Doctrine\ORM\PersistentCollection {#2464 …}
+votes: Doctrine\ORM\PersistentCollection {#2448 …}
+reports: Doctrine\ORM\PersistentCollection {#2447 …}
+favourites: Doctrine\ORM\PersistentCollection {#2462 …}
+notifications: Doctrine\ORM\PersistentCollection {#2461 …}
-id: 339958
-bodyTs: "'case':89 'cli':15 'compos':31 'contain':2,26,38,48,59,73 'creat':17 'default':4 'docker':14,30 'docker-compos':29 'exampl':61 'feasibl':95 'howev':66 'insid':52 'isol':79 'kind':85 'most':78 'namespac':10,55 'network':9,19,45,54 'outsid':37 'process':36 'recommend':70 'run':5,50,62,77 'separ':8 'share':23 'specif':18 'still':41 'suppos':75 'technic':34,92 'unshar':65 'use':13,28,42,88 'use-cas':87 'vpn':58 'workload':80 'wouldn':68 'yeah':91"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/7007733"
+editedAt: null
+createdAt: DateTimeImmutable @1706207127 {#1739
date: 2024-01-25 19:25:27.0 +01:00
}
+"title": 339958
} |
|
Show voter details
|
8 |
DENIED
|
moderate
|
App\Entity\EntryComment {#1741
+user: App\Entity\User {#261 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1740
+user: Proxies\__CG__\App\Entity\User {#2372 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2130 …}
+slug: "How-do-I-create-a-docker-container-with-custom-programs"
+title: "How do I create a docker container with custom programs inside?"
+url: null
+body: """
Hello! I have a free account at hide.me and would like to try to use it with my docker compose containers. The free plan does not give me the keys for openVPN of Wireguard configuration, but only through the official client. I’d like then to create a docker container that runs the official hide.me client inside, and exposes it to other docker containers (like gluetun does, for instance). I’d also like to implement a killswitch or something like that to prevent ip leakage. Is this something easy-medium hard or something very complex? I already have a script that installs and runs the client to enable vpn that should be run at startup, but I miss the “expose the network interface” and the “do not expose it if not connected” (this last part I think is pretty easy with a basic firewall configuration)\n
\n
any tips/something already done? \n
thanks in advance!\n
\n
EDIT: probably crazy idea, but would it be possible to do this in gluetun?
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 11
+favouriteCount: 30
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1728784342 {#2460
date: 2024-10-13 03:52:22.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2140 …}
+votes: Doctrine\ORM\PersistentCollection {#2094 …}
+reports: Doctrine\ORM\PersistentCollection {#2090 …}
+favourites: Doctrine\ORM\PersistentCollection {#2327 …}
+notifications: Doctrine\ORM\PersistentCollection {#2328 …}
+badges: Doctrine\ORM\PersistentCollection {#2335 …}
+children: [
App\Entity\EntryComment {#1741}
]
-id: 33027
-titleTs: "'contain':7 'creat':4 'custom':9 'docker':6 'insid':11 'program':10"
-bodyTs: "'account':6 'advanc':153 'alreadi':98,149 'also':72 'basic':144 'client':41,56,107 'complex':96 'compos':20 'configur':35,146 'connect':133 'contain':21,50,64 'crazi':156 'creat':47 'd':43,71 'docker':19,49,63 'done':150 'easi':90,141 'easy-medium':89 'edit':154 'enabl':109 'expos':59,121,129 'firewal':145 'free':5,23 'give':27 'gluetun':66,167 'hard':92 'hello':1 'hide.me':8,55 'idea':157 'implement':75 'insid':57 'instal':103 'instanc':69 'interfac':124 'ip':84 'key':30 'killswitch':77 'last':135 'leakag':85 'like':11,44,65,73,80 'medium':91 'miss':119 'network':123 'offici':40,54 'openvpn':32 'part':136 'plan':24 'possibl':162 'pretti':140 'prevent':83 'probabl':155 'run':52,105,114 'script':101 'someth':79,88,94 'startup':116 'thank':151 'think':138 'tips/something':148 'tri':13 'use':15 'vpn':110 'wireguard':34 'would':10,159"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1706287054
+visibility: "visible "
+apId: "https://lemmy.kde.social/post/722914"
+editedAt: null
+createdAt: DateTimeImmutable @1706200654 {#2360
date: 2024-01-25 17:37:34.0 +01:00
}
+__isInitialized__: true
…2
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: null
+parent: null
+root: null
+body: "Each container, by default, runs in a separate network namespace. You can use docker CLI to create specific networks that can be shared with other containers, or use docker-compose for it. Technically, for processes outside containers you can still use the same network of that container by running the inside the network namespace of the ‘VPN’ container (for example running them with unshare). However, I wouldn’t recommend this, as containers are supposed to run mostly isolated workload and not for this kind of use-case. But yeah, technically it’s feasible."
+lang: "en"
+isAdult: false
+favouriteCount: 7
+score: 0
+lastActive: DateTime @1706207127 {#1717
date: 2024-01-25 19:25:27.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@tubbadu@lemmy.kde.social"
]
+children: Doctrine\ORM\PersistentCollection {#1707 …}
+nested: Doctrine\ORM\PersistentCollection {#2464 …}
+votes: Doctrine\ORM\PersistentCollection {#2448 …}
+reports: Doctrine\ORM\PersistentCollection {#2447 …}
+favourites: Doctrine\ORM\PersistentCollection {#2462 …}
+notifications: Doctrine\ORM\PersistentCollection {#2461 …}
-id: 339958
-bodyTs: "'case':89 'cli':15 'compos':31 'contain':2,26,38,48,59,73 'creat':17 'default':4 'docker':14,30 'docker-compos':29 'exampl':61 'feasibl':95 'howev':66 'insid':52 'isol':79 'kind':85 'most':78 'namespac':10,55 'network':9,19,45,54 'outsid':37 'process':36 'recommend':70 'run':5,50,62,77 'separ':8 'share':23 'specif':18 'still':41 'suppos':75 'technic':34,92 'unshar':65 'use':13,28,42,88 'use-cas':87 'vpn':58 'workload':80 'wouldn':68 'yeah':91"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/7007733"
+editedAt: null
+createdAt: DateTimeImmutable @1706207127 {#1739
date: 2024-01-25 19:25:27.0 +01:00
}
+"title": 339958
} |
|
Show voter details
|
9 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
10 |
DENIED
|
moderate
|
Proxies\__CG__\App\Entity\Entry {#1626
+user: Proxies\__CG__\App\Entity\User {#2338 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2130 …}
+slug: "How-to-secure-podman-or-docker-containers-for-public-facing-hosting"
+title: "How to secure (podman or docker) containers for public-facing hosting?"
+url: null
+body: """
Context\n
-------\n
\n
I want to host public-facing applications on a server in my home, without compromising security. I realize containers might be one way to do this, and want to explore that route further.\n
\n
Requirements\n
------------\n
\n
I want to run applications within containers such that they\n
\n
- Must not be able to interfere with applications running on host\n
- Must not be able to interfere with other containers or applications inside them\n
- Must have no access or influence on other devices in the local network, or otherwise compromise the security of the network, but still accessible by devices via ssh.\n
\n
> Note: all of this within reason. I understand that sometimes there may be occasional vulnerabilities, like in kernel for example, that would eventually get fixed. Risks like this within reason I am willing to accept.\n
\n
What I found so far\n
-------------------\n
\n
- **Running containers in rootless mode:** in other words, running the container daemon with an unprivileged host user\n
- **Running applications in container under unprivileged users:** the container user under which the container is ran should be unprivileged\n
- **Networking:** The container’s networking must be restricted. I am still not sure how to do this and shall explore it more, but would appreciate any resources.\n
\n
Alternative solution\n
--------------------\n
\n
I have seen bubblewrap presented as an alternative, but it seems like it is not intended to be used directly in this manner, and information about using it for this is scarce.
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 21
+favouriteCount: 83
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1719138740 {#2337
date: 2024-06-23 12:32:20.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2159 …}
+votes: Doctrine\ORM\PersistentCollection {#2074 …}
+reports: Doctrine\ORM\PersistentCollection {#2071 …}
+favourites: Doctrine\ORM\PersistentCollection {#2070 …}
+notifications: Doctrine\ORM\PersistentCollection {#2048 …}
+badges: Doctrine\ORM\PersistentCollection {#2056 …}
+children: [
1 => App\Entity\EntryComment {#1628
+user: App\Entity\User {#261 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1626 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: null
+parent: null
+root: null
+body: """
You already mentioned the most important things.\n
\n
I will add, at the cost of being pedantic:\n
\n
- build the image properly, or use good images. This means limit dependencies as much as possible, as minimal images as possible (less updates due to CVEs, less tooling).\n
- do not mount host volumes, if you really have to, use a dedicated subpath owned by the user of the container. Do not use homedirs etc.\n
- do not run in host namespaces, like host network etc. Use port mapping to send traffic to the container.\n
\n
If you want to go hardcore:\n
\n
- analyze your application, and if feasible, build and use a more restrictive seccomp profile compared to the default. This might limit additional syscalls that might be used during an exploitation but that your app doesn’t need.\n
- run falco on the node. Even with the default set of rules (nothing custom), many exploitation or posts-exploitation steps would be caught, such as “shell spawned” etc.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 6
+score: 0
+lastActive: DateTime @1719122506 {#1630
date: 2024-06-23 08:01:46.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@cyclohexane@lemmy.ml"
]
+children: Doctrine\ORM\PersistentCollection {#1599 …}
+nested: Doctrine\ORM\PersistentCollection {#1625 …}
+votes: Doctrine\ORM\PersistentCollection {#1617 …}
+reports: Doctrine\ORM\PersistentCollection {#1725 …}
+favourites: Doctrine\ORM\PersistentCollection {#1722 …}
+notifications: Doctrine\ORM\PersistentCollection {#1726 …}
-id: 288266
-bodyTs: "'add':10 'addit':117 'alreadi':2 'analyz':96 'app':129 'applic':98 'build':17,102 'caught':156 'compar':110 'contain':65,89 'cost':13 'custom':146 'cves':42 'dedic':57 'default':113,141 'depend':28 'doesn':130 'due':40 'etc':70,80,161 'even':138 'exploit':125,148,152 'falco':134 'feasibl':101 'go':94 'good':23 'hardcor':95 'homedir':69 'host':48,75,78 'imag':19,24,35 'import':6 'less':38,43 'like':77 'limit':27,116 'mani':147 'map':83 'mean':26 'mention':3 'might':115,120 'minim':34 'mount':47 'much':30 'namespac':76 'need':132 'network':79 'node':137 'noth':145 'own':59 'pedant':16 'port':82 'possibl':32,37 'post':151 'posts-exploit':150 'profil':109 'proper':20 'realli':52 'restrict':107 'rule':144 'run':73,133 'seccomp':108 'send':85 'set':142 'shell':159 'spawn':160 'step':153 'subpath':58 'syscal':118 'thing':7 'tool':44 'traffic':86 'updat':39 'use':22,55,68,81,104,122 'user':62 'volum':49 'want':92 'would':154"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/6473668"
+editedAt: null
+createdAt: DateTimeImmutable @1704620762 {#1629
date: 2024-01-07 10:46:02.0 +01:00
}
+"title": 288266
}
0 => App\Entity\EntryComment {#1737
+user: App\Entity\User {#261 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1626 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#1734 …}
+root: App\Entity\EntryComment {#1628}
+body: "It’s the de-facto standard for runtime container security (sysdig is based on it). The only competitor afaik is aqua security’s tracee, which is way less mature. It is very well supporter, there are tons of rules maintained by the community and it is a CNCF project used by enterprise solutions (I.e., shouldn’t disappear overnight)."
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704690575 {#1736
date: 2024-01-08 06:09:35.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@cyclohexane@lemmy.ml"
"@sudneo@lemmy.world"
"@krash@lemmy.ml"
]
+children: Doctrine\ORM\PersistentCollection {#1732 …}
+nested: Doctrine\ORM\PersistentCollection {#1735 …}
+votes: Doctrine\ORM\PersistentCollection {#1729 …}
+reports: Doctrine\ORM\PersistentCollection {#1719 …}
+favourites: Doctrine\ORM\PersistentCollection {#1714 …}
+notifications: Doctrine\ORM\PersistentCollection {#1720 …}
-id: 290565
-bodyTs: "'afaik':20 'aqua':22 'base':14 'cncf':49 'communiti':44 'competitor':19 'contain':10 'de':5 'de-facto':4 'disappear':58 'enterpris':53 'facto':6 'i.e':55 'less':29 'maintain':41 'matur':30 'overnight':59 'project':50 'rule':40 'runtim':9 'secur':11,23 'shouldn':56 'solut':54 'standard':7 'support':35 'sysdig':12 'ton':38 'trace':25 'use':51 'way':28 'well':34"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/6491825"
+editedAt: null
+createdAt: DateTimeImmutable @1704690575 {#1730
date: 2024-01-08 06:09:35.0 +01:00
}
+"title": 290565
}
]
-id: 27753
-titleTs: "'contain':7 'docker':6 'face':11 'host':12 'podman':4 'public':10 'public-fac':9 'secur':3"
-bodyTs: "'abl':50,61 'accept':133 'access':74,94 'altern':202,211 'applic':9,41,54,68,157 'appreci':199 'bubblewrap':207 'compromis':17,86 'contain':21,43,66,140,149,159,164,169,177 'context':1 'daemon':150 'devic':79,96 'direct':223 'eventu':121 'exampl':118 'explor':32,194 'face':8 'far':138 'fix':123 'found':136 'get':122 'home':15 'host':5,57,154 'influenc':76 'inform':228 'insid':69 'intend':219 'interfer':52,63 'kernel':116 'like':114,125,215 'local':82 'manner':226 'may':110 'might':22 'mode':143 'must':47,58,71,180 'network':83,91,175,179 'note':99 'occasion':112 'one':24 'otherwis':85 'present':208 'public':7 'public-fac':6 'ran':171 'realiz':20 'reason':104,128 'requir':36 'resourc':201 'restrict':182 'risk':124 'rootless':142 'rout':34 'run':40,55,139,147,156 'scarc':235 'secur':18,88 'seem':214 'seen':206 'server':12 'shall':193 'solut':203 'sometim':108 'ssh':98 'still':93,185 'sure':187 'understand':106 'unprivileg':153,161,174 'use':222,230 'user':155,162,165 'via':97 'vulner':113 'want':3,30,38 'way':25 'will':131 'within':42,103,127 'without':16 'word':146 'would':120,198"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704677667
+visibility: "visible "
+apId: "https://lemmy.ml/post/10216078"
+editedAt: DateTimeImmutable @1712598393 {#2079
date: 2024-04-08 19:46:33.0 +02:00
}
+createdAt: DateTimeImmutable @1704591267 {#2062
date: 2024-01-07 02:34:27.0 +01:00
}
+__isInitialized__: true
…2
} |
|
Show voter details
|
11 |
DENIED
|
edit
|
Proxies\__CG__\App\Entity\Entry {#1626
+user: Proxies\__CG__\App\Entity\User {#2338 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2130 …}
+slug: "How-to-secure-podman-or-docker-containers-for-public-facing-hosting"
+title: "How to secure (podman or docker) containers for public-facing hosting?"
+url: null
+body: """
Context\n
-------\n
\n
I want to host public-facing applications on a server in my home, without compromising security. I realize containers might be one way to do this, and want to explore that route further.\n
\n
Requirements\n
------------\n
\n
I want to run applications within containers such that they\n
\n
- Must not be able to interfere with applications running on host\n
- Must not be able to interfere with other containers or applications inside them\n
- Must have no access or influence on other devices in the local network, or otherwise compromise the security of the network, but still accessible by devices via ssh.\n
\n
> Note: all of this within reason. I understand that sometimes there may be occasional vulnerabilities, like in kernel for example, that would eventually get fixed. Risks like this within reason I am willing to accept.\n
\n
What I found so far\n
-------------------\n
\n
- **Running containers in rootless mode:** in other words, running the container daemon with an unprivileged host user\n
- **Running applications in container under unprivileged users:** the container user under which the container is ran should be unprivileged\n
- **Networking:** The container’s networking must be restricted. I am still not sure how to do this and shall explore it more, but would appreciate any resources.\n
\n
Alternative solution\n
--------------------\n
\n
I have seen bubblewrap presented as an alternative, but it seems like it is not intended to be used directly in this manner, and information about using it for this is scarce.
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 21
+favouriteCount: 83
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1719138740 {#2337
date: 2024-06-23 12:32:20.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2159 …}
+votes: Doctrine\ORM\PersistentCollection {#2074 …}
+reports: Doctrine\ORM\PersistentCollection {#2071 …}
+favourites: Doctrine\ORM\PersistentCollection {#2070 …}
+notifications: Doctrine\ORM\PersistentCollection {#2048 …}
+badges: Doctrine\ORM\PersistentCollection {#2056 …}
+children: [
1 => App\Entity\EntryComment {#1628
+user: App\Entity\User {#261 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1626 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: null
+parent: null
+root: null
+body: """
You already mentioned the most important things.\n
\n
I will add, at the cost of being pedantic:\n
\n
- build the image properly, or use good images. This means limit dependencies as much as possible, as minimal images as possible (less updates due to CVEs, less tooling).\n
- do not mount host volumes, if you really have to, use a dedicated subpath owned by the user of the container. Do not use homedirs etc.\n
- do not run in host namespaces, like host network etc. Use port mapping to send traffic to the container.\n
\n
If you want to go hardcore:\n
\n
- analyze your application, and if feasible, build and use a more restrictive seccomp profile compared to the default. This might limit additional syscalls that might be used during an exploitation but that your app doesn’t need.\n
- run falco on the node. Even with the default set of rules (nothing custom), many exploitation or posts-exploitation steps would be caught, such as “shell spawned” etc.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 6
+score: 0
+lastActive: DateTime @1719122506 {#1630
date: 2024-06-23 08:01:46.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@cyclohexane@lemmy.ml"
]
+children: Doctrine\ORM\PersistentCollection {#1599 …}
+nested: Doctrine\ORM\PersistentCollection {#1625 …}
+votes: Doctrine\ORM\PersistentCollection {#1617 …}
+reports: Doctrine\ORM\PersistentCollection {#1725 …}
+favourites: Doctrine\ORM\PersistentCollection {#1722 …}
+notifications: Doctrine\ORM\PersistentCollection {#1726 …}
-id: 288266
-bodyTs: "'add':10 'addit':117 'alreadi':2 'analyz':96 'app':129 'applic':98 'build':17,102 'caught':156 'compar':110 'contain':65,89 'cost':13 'custom':146 'cves':42 'dedic':57 'default':113,141 'depend':28 'doesn':130 'due':40 'etc':70,80,161 'even':138 'exploit':125,148,152 'falco':134 'feasibl':101 'go':94 'good':23 'hardcor':95 'homedir':69 'host':48,75,78 'imag':19,24,35 'import':6 'less':38,43 'like':77 'limit':27,116 'mani':147 'map':83 'mean':26 'mention':3 'might':115,120 'minim':34 'mount':47 'much':30 'namespac':76 'need':132 'network':79 'node':137 'noth':145 'own':59 'pedant':16 'port':82 'possibl':32,37 'post':151 'posts-exploit':150 'profil':109 'proper':20 'realli':52 'restrict':107 'rule':144 'run':73,133 'seccomp':108 'send':85 'set':142 'shell':159 'spawn':160 'step':153 'subpath':58 'syscal':118 'thing':7 'tool':44 'traffic':86 'updat':39 'use':22,55,68,81,104,122 'user':62 'volum':49 'want':92 'would':154"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/6473668"
+editedAt: null
+createdAt: DateTimeImmutable @1704620762 {#1629
date: 2024-01-07 10:46:02.0 +01:00
}
+"title": 288266
}
0 => App\Entity\EntryComment {#1737
+user: App\Entity\User {#261 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1626 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#1734 …}
+root: App\Entity\EntryComment {#1628}
+body: "It’s the de-facto standard for runtime container security (sysdig is based on it). The only competitor afaik is aqua security’s tracee, which is way less mature. It is very well supporter, there are tons of rules maintained by the community and it is a CNCF project used by enterprise solutions (I.e., shouldn’t disappear overnight)."
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704690575 {#1736
date: 2024-01-08 06:09:35.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@cyclohexane@lemmy.ml"
"@sudneo@lemmy.world"
"@krash@lemmy.ml"
]
+children: Doctrine\ORM\PersistentCollection {#1732 …}
+nested: Doctrine\ORM\PersistentCollection {#1735 …}
+votes: Doctrine\ORM\PersistentCollection {#1729 …}
+reports: Doctrine\ORM\PersistentCollection {#1719 …}
+favourites: Doctrine\ORM\PersistentCollection {#1714 …}
+notifications: Doctrine\ORM\PersistentCollection {#1720 …}
-id: 290565
-bodyTs: "'afaik':20 'aqua':22 'base':14 'cncf':49 'communiti':44 'competitor':19 'contain':10 'de':5 'de-facto':4 'disappear':58 'enterpris':53 'facto':6 'i.e':55 'less':29 'maintain':41 'matur':30 'overnight':59 'project':50 'rule':40 'runtim':9 'secur':11,23 'shouldn':56 'solut':54 'standard':7 'support':35 'sysdig':12 'ton':38 'trace':25 'use':51 'way':28 'well':34"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/6491825"
+editedAt: null
+createdAt: DateTimeImmutable @1704690575 {#1730
date: 2024-01-08 06:09:35.0 +01:00
}
+"title": 290565
}
]
-id: 27753
-titleTs: "'contain':7 'docker':6 'face':11 'host':12 'podman':4 'public':10 'public-fac':9 'secur':3"
-bodyTs: "'abl':50,61 'accept':133 'access':74,94 'altern':202,211 'applic':9,41,54,68,157 'appreci':199 'bubblewrap':207 'compromis':17,86 'contain':21,43,66,140,149,159,164,169,177 'context':1 'daemon':150 'devic':79,96 'direct':223 'eventu':121 'exampl':118 'explor':32,194 'face':8 'far':138 'fix':123 'found':136 'get':122 'home':15 'host':5,57,154 'influenc':76 'inform':228 'insid':69 'intend':219 'interfer':52,63 'kernel':116 'like':114,125,215 'local':82 'manner':226 'may':110 'might':22 'mode':143 'must':47,58,71,180 'network':83,91,175,179 'note':99 'occasion':112 'one':24 'otherwis':85 'present':208 'public':7 'public-fac':6 'ran':171 'realiz':20 'reason':104,128 'requir':36 'resourc':201 'restrict':182 'risk':124 'rootless':142 'rout':34 'run':40,55,139,147,156 'scarc':235 'secur':18,88 'seem':214 'seen':206 'server':12 'shall':193 'solut':203 'sometim':108 'ssh':98 'still':93,185 'sure':187 'understand':106 'unprivileg':153,161,174 'use':222,230 'user':155,162,165 'via':97 'vulner':113 'want':3,30,38 'way':25 'will':131 'within':42,103,127 'without':16 'word':146 'would':120,198"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704677667
+visibility: "visible "
+apId: "https://lemmy.ml/post/10216078"
+editedAt: DateTimeImmutable @1712598393 {#2079
date: 2024-04-08 19:46:33.0 +02:00
}
+createdAt: DateTimeImmutable @1704591267 {#2062
date: 2024-01-07 02:34:27.0 +01:00
}
+__isInitialized__: true
…2
} |
|
Show voter details
|
12 |
DENIED
|
moderate
|
Proxies\__CG__\App\Entity\Entry {#1626
+user: Proxies\__CG__\App\Entity\User {#2338 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2130 …}
+slug: "How-to-secure-podman-or-docker-containers-for-public-facing-hosting"
+title: "How to secure (podman or docker) containers for public-facing hosting?"
+url: null
+body: """
Context\n
-------\n
\n
I want to host public-facing applications on a server in my home, without compromising security. I realize containers might be one way to do this, and want to explore that route further.\n
\n
Requirements\n
------------\n
\n
I want to run applications within containers such that they\n
\n
- Must not be able to interfere with applications running on host\n
- Must not be able to interfere with other containers or applications inside them\n
- Must have no access or influence on other devices in the local network, or otherwise compromise the security of the network, but still accessible by devices via ssh.\n
\n
> Note: all of this within reason. I understand that sometimes there may be occasional vulnerabilities, like in kernel for example, that would eventually get fixed. Risks like this within reason I am willing to accept.\n
\n
What I found so far\n
-------------------\n
\n
- **Running containers in rootless mode:** in other words, running the container daemon with an unprivileged host user\n
- **Running applications in container under unprivileged users:** the container user under which the container is ran should be unprivileged\n
- **Networking:** The container’s networking must be restricted. I am still not sure how to do this and shall explore it more, but would appreciate any resources.\n
\n
Alternative solution\n
--------------------\n
\n
I have seen bubblewrap presented as an alternative, but it seems like it is not intended to be used directly in this manner, and information about using it for this is scarce.
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 21
+favouriteCount: 83
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1719138740 {#2337
date: 2024-06-23 12:32:20.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2159 …}
+votes: Doctrine\ORM\PersistentCollection {#2074 …}
+reports: Doctrine\ORM\PersistentCollection {#2071 …}
+favourites: Doctrine\ORM\PersistentCollection {#2070 …}
+notifications: Doctrine\ORM\PersistentCollection {#2048 …}
+badges: Doctrine\ORM\PersistentCollection {#2056 …}
+children: [
1 => App\Entity\EntryComment {#1628
+user: App\Entity\User {#261 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1626 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: null
+parent: null
+root: null
+body: """
You already mentioned the most important things.\n
\n
I will add, at the cost of being pedantic:\n
\n
- build the image properly, or use good images. This means limit dependencies as much as possible, as minimal images as possible (less updates due to CVEs, less tooling).\n
- do not mount host volumes, if you really have to, use a dedicated subpath owned by the user of the container. Do not use homedirs etc.\n
- do not run in host namespaces, like host network etc. Use port mapping to send traffic to the container.\n
\n
If you want to go hardcore:\n
\n
- analyze your application, and if feasible, build and use a more restrictive seccomp profile compared to the default. This might limit additional syscalls that might be used during an exploitation but that your app doesn’t need.\n
- run falco on the node. Even with the default set of rules (nothing custom), many exploitation or posts-exploitation steps would be caught, such as “shell spawned” etc.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 6
+score: 0
+lastActive: DateTime @1719122506 {#1630
date: 2024-06-23 08:01:46.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@cyclohexane@lemmy.ml"
]
+children: Doctrine\ORM\PersistentCollection {#1599 …}
+nested: Doctrine\ORM\PersistentCollection {#1625 …}
+votes: Doctrine\ORM\PersistentCollection {#1617 …}
+reports: Doctrine\ORM\PersistentCollection {#1725 …}
+favourites: Doctrine\ORM\PersistentCollection {#1722 …}
+notifications: Doctrine\ORM\PersistentCollection {#1726 …}
-id: 288266
-bodyTs: "'add':10 'addit':117 'alreadi':2 'analyz':96 'app':129 'applic':98 'build':17,102 'caught':156 'compar':110 'contain':65,89 'cost':13 'custom':146 'cves':42 'dedic':57 'default':113,141 'depend':28 'doesn':130 'due':40 'etc':70,80,161 'even':138 'exploit':125,148,152 'falco':134 'feasibl':101 'go':94 'good':23 'hardcor':95 'homedir':69 'host':48,75,78 'imag':19,24,35 'import':6 'less':38,43 'like':77 'limit':27,116 'mani':147 'map':83 'mean':26 'mention':3 'might':115,120 'minim':34 'mount':47 'much':30 'namespac':76 'need':132 'network':79 'node':137 'noth':145 'own':59 'pedant':16 'port':82 'possibl':32,37 'post':151 'posts-exploit':150 'profil':109 'proper':20 'realli':52 'restrict':107 'rule':144 'run':73,133 'seccomp':108 'send':85 'set':142 'shell':159 'spawn':160 'step':153 'subpath':58 'syscal':118 'thing':7 'tool':44 'traffic':86 'updat':39 'use':22,55,68,81,104,122 'user':62 'volum':49 'want':92 'would':154"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/6473668"
+editedAt: null
+createdAt: DateTimeImmutable @1704620762 {#1629
date: 2024-01-07 10:46:02.0 +01:00
}
+"title": 288266
}
0 => App\Entity\EntryComment {#1737
+user: App\Entity\User {#261 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1626 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#1734 …}
+root: App\Entity\EntryComment {#1628}
+body: "It’s the de-facto standard for runtime container security (sysdig is based on it). The only competitor afaik is aqua security’s tracee, which is way less mature. It is very well supporter, there are tons of rules maintained by the community and it is a CNCF project used by enterprise solutions (I.e., shouldn’t disappear overnight)."
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704690575 {#1736
date: 2024-01-08 06:09:35.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@cyclohexane@lemmy.ml"
"@sudneo@lemmy.world"
"@krash@lemmy.ml"
]
+children: Doctrine\ORM\PersistentCollection {#1732 …}
+nested: Doctrine\ORM\PersistentCollection {#1735 …}
+votes: Doctrine\ORM\PersistentCollection {#1729 …}
+reports: Doctrine\ORM\PersistentCollection {#1719 …}
+favourites: Doctrine\ORM\PersistentCollection {#1714 …}
+notifications: Doctrine\ORM\PersistentCollection {#1720 …}
-id: 290565
-bodyTs: "'afaik':20 'aqua':22 'base':14 'cncf':49 'communiti':44 'competitor':19 'contain':10 'de':5 'de-facto':4 'disappear':58 'enterpris':53 'facto':6 'i.e':55 'less':29 'maintain':41 'matur':30 'overnight':59 'project':50 'rule':40 'runtim':9 'secur':11,23 'shouldn':56 'solut':54 'standard':7 'support':35 'sysdig':12 'ton':38 'trace':25 'use':51 'way':28 'well':34"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/6491825"
+editedAt: null
+createdAt: DateTimeImmutable @1704690575 {#1730
date: 2024-01-08 06:09:35.0 +01:00
}
+"title": 290565
}
]
-id: 27753
-titleTs: "'contain':7 'docker':6 'face':11 'host':12 'podman':4 'public':10 'public-fac':9 'secur':3"
-bodyTs: "'abl':50,61 'accept':133 'access':74,94 'altern':202,211 'applic':9,41,54,68,157 'appreci':199 'bubblewrap':207 'compromis':17,86 'contain':21,43,66,140,149,159,164,169,177 'context':1 'daemon':150 'devic':79,96 'direct':223 'eventu':121 'exampl':118 'explor':32,194 'face':8 'far':138 'fix':123 'found':136 'get':122 'home':15 'host':5,57,154 'influenc':76 'inform':228 'insid':69 'intend':219 'interfer':52,63 'kernel':116 'like':114,125,215 'local':82 'manner':226 'may':110 'might':22 'mode':143 'must':47,58,71,180 'network':83,91,175,179 'note':99 'occasion':112 'one':24 'otherwis':85 'present':208 'public':7 'public-fac':6 'ran':171 'realiz':20 'reason':104,128 'requir':36 'resourc':201 'restrict':182 'risk':124 'rootless':142 'rout':34 'run':40,55,139,147,156 'scarc':235 'secur':18,88 'seem':214 'seen':206 'server':12 'shall':193 'solut':203 'sometim':108 'ssh':98 'still':93,185 'sure':187 'understand':106 'unprivileg':153,161,174 'use':222,230 'user':155,162,165 'via':97 'vulner':113 'want':3,30,38 'way':25 'will':131 'within':42,103,127 'without':16 'word':146 'would':120,198"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704677667
+visibility: "visible "
+apId: "https://lemmy.ml/post/10216078"
+editedAt: DateTimeImmutable @1712598393 {#2079
date: 2024-04-08 19:46:33.0 +02:00
}
+createdAt: DateTimeImmutable @1704591267 {#2062
date: 2024-01-07 02:34:27.0 +01:00
}
+__isInitialized__: true
…2
} |
|
Show voter details
|
13 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
14 |
DENIED
|
moderate
|
App\Entity\EntryComment {#1628
+user: App\Entity\User {#261 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1626
+user: Proxies\__CG__\App\Entity\User {#2338 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2130 …}
+slug: "How-to-secure-podman-or-docker-containers-for-public-facing-hosting"
+title: "How to secure (podman or docker) containers for public-facing hosting?"
+url: null
+body: """
Context\n
-------\n
\n
I want to host public-facing applications on a server in my home, without compromising security. I realize containers might be one way to do this, and want to explore that route further.\n
\n
Requirements\n
------------\n
\n
I want to run applications within containers such that they\n
\n
- Must not be able to interfere with applications running on host\n
- Must not be able to interfere with other containers or applications inside them\n
- Must have no access or influence on other devices in the local network, or otherwise compromise the security of the network, but still accessible by devices via ssh.\n
\n
> Note: all of this within reason. I understand that sometimes there may be occasional vulnerabilities, like in kernel for example, that would eventually get fixed. Risks like this within reason I am willing to accept.\n
\n
What I found so far\n
-------------------\n
\n
- **Running containers in rootless mode:** in other words, running the container daemon with an unprivileged host user\n
- **Running applications in container under unprivileged users:** the container user under which the container is ran should be unprivileged\n
- **Networking:** The container’s networking must be restricted. I am still not sure how to do this and shall explore it more, but would appreciate any resources.\n
\n
Alternative solution\n
--------------------\n
\n
I have seen bubblewrap presented as an alternative, but it seems like it is not intended to be used directly in this manner, and information about using it for this is scarce.
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 21
+favouriteCount: 83
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1719138740 {#2337
date: 2024-06-23 12:32:20.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2159 …}
+votes: Doctrine\ORM\PersistentCollection {#2074 …}
+reports: Doctrine\ORM\PersistentCollection {#2071 …}
+favourites: Doctrine\ORM\PersistentCollection {#2070 …}
+notifications: Doctrine\ORM\PersistentCollection {#2048 …}
+badges: Doctrine\ORM\PersistentCollection {#2056 …}
+children: [
1 => App\Entity\EntryComment {#1628}
0 => App\Entity\EntryComment {#1737
+user: App\Entity\User {#261 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1626 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#1734 …}
+root: App\Entity\EntryComment {#1628}
+body: "It’s the de-facto standard for runtime container security (sysdig is based on it). The only competitor afaik is aqua security’s tracee, which is way less mature. It is very well supporter, there are tons of rules maintained by the community and it is a CNCF project used by enterprise solutions (I.e., shouldn’t disappear overnight)."
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704690575 {#1736
date: 2024-01-08 06:09:35.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@cyclohexane@lemmy.ml"
"@sudneo@lemmy.world"
"@krash@lemmy.ml"
]
+children: Doctrine\ORM\PersistentCollection {#1732 …}
+nested: Doctrine\ORM\PersistentCollection {#1735 …}
+votes: Doctrine\ORM\PersistentCollection {#1729 …}
+reports: Doctrine\ORM\PersistentCollection {#1719 …}
+favourites: Doctrine\ORM\PersistentCollection {#1714 …}
+notifications: Doctrine\ORM\PersistentCollection {#1720 …}
-id: 290565
-bodyTs: "'afaik':20 'aqua':22 'base':14 'cncf':49 'communiti':44 'competitor':19 'contain':10 'de':5 'de-facto':4 'disappear':58 'enterpris':53 'facto':6 'i.e':55 'less':29 'maintain':41 'matur':30 'overnight':59 'project':50 'rule':40 'runtim':9 'secur':11,23 'shouldn':56 'solut':54 'standard':7 'support':35 'sysdig':12 'ton':38 'trace':25 'use':51 'way':28 'well':34"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/6491825"
+editedAt: null
+createdAt: DateTimeImmutable @1704690575 {#1730
date: 2024-01-08 06:09:35.0 +01:00
}
+"title": 290565
}
]
-id: 27753
-titleTs: "'contain':7 'docker':6 'face':11 'host':12 'podman':4 'public':10 'public-fac':9 'secur':3"
-bodyTs: "'abl':50,61 'accept':133 'access':74,94 'altern':202,211 'applic':9,41,54,68,157 'appreci':199 'bubblewrap':207 'compromis':17,86 'contain':21,43,66,140,149,159,164,169,177 'context':1 'daemon':150 'devic':79,96 'direct':223 'eventu':121 'exampl':118 'explor':32,194 'face':8 'far':138 'fix':123 'found':136 'get':122 'home':15 'host':5,57,154 'influenc':76 'inform':228 'insid':69 'intend':219 'interfer':52,63 'kernel':116 'like':114,125,215 'local':82 'manner':226 'may':110 'might':22 'mode':143 'must':47,58,71,180 'network':83,91,175,179 'note':99 'occasion':112 'one':24 'otherwis':85 'present':208 'public':7 'public-fac':6 'ran':171 'realiz':20 'reason':104,128 'requir':36 'resourc':201 'restrict':182 'risk':124 'rootless':142 'rout':34 'run':40,55,139,147,156 'scarc':235 'secur':18,88 'seem':214 'seen':206 'server':12 'shall':193 'solut':203 'sometim':108 'ssh':98 'still':93,185 'sure':187 'understand':106 'unprivileg':153,161,174 'use':222,230 'user':155,162,165 'via':97 'vulner':113 'want':3,30,38 'way':25 'will':131 'within':42,103,127 'without':16 'word':146 'would':120,198"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704677667
+visibility: "visible "
+apId: "https://lemmy.ml/post/10216078"
+editedAt: DateTimeImmutable @1712598393 {#2079
date: 2024-04-08 19:46:33.0 +02:00
}
+createdAt: DateTimeImmutable @1704591267 {#2062
date: 2024-01-07 02:34:27.0 +01:00
}
+__isInitialized__: true
…2
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: null
+parent: null
+root: null
+body: """
You already mentioned the most important things.\n
\n
I will add, at the cost of being pedantic:\n
\n
- build the image properly, or use good images. This means limit dependencies as much as possible, as minimal images as possible (less updates due to CVEs, less tooling).\n
- do not mount host volumes, if you really have to, use a dedicated subpath owned by the user of the container. Do not use homedirs etc.\n
- do not run in host namespaces, like host network etc. Use port mapping to send traffic to the container.\n
\n
If you want to go hardcore:\n
\n
- analyze your application, and if feasible, build and use a more restrictive seccomp profile compared to the default. This might limit additional syscalls that might be used during an exploitation but that your app doesn’t need.\n
- run falco on the node. Even with the default set of rules (nothing custom), many exploitation or posts-exploitation steps would be caught, such as “shell spawned” etc.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 6
+score: 0
+lastActive: DateTime @1719122506 {#1630
date: 2024-06-23 08:01:46.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@cyclohexane@lemmy.ml"
]
+children: Doctrine\ORM\PersistentCollection {#1599 …}
+nested: Doctrine\ORM\PersistentCollection {#1625 …}
+votes: Doctrine\ORM\PersistentCollection {#1617 …}
+reports: Doctrine\ORM\PersistentCollection {#1725 …}
+favourites: Doctrine\ORM\PersistentCollection {#1722 …}
+notifications: Doctrine\ORM\PersistentCollection {#1726 …}
-id: 288266
-bodyTs: "'add':10 'addit':117 'alreadi':2 'analyz':96 'app':129 'applic':98 'build':17,102 'caught':156 'compar':110 'contain':65,89 'cost':13 'custom':146 'cves':42 'dedic':57 'default':113,141 'depend':28 'doesn':130 'due':40 'etc':70,80,161 'even':138 'exploit':125,148,152 'falco':134 'feasibl':101 'go':94 'good':23 'hardcor':95 'homedir':69 'host':48,75,78 'imag':19,24,35 'import':6 'less':38,43 'like':77 'limit':27,116 'mani':147 'map':83 'mean':26 'mention':3 'might':115,120 'minim':34 'mount':47 'much':30 'namespac':76 'need':132 'network':79 'node':137 'noth':145 'own':59 'pedant':16 'port':82 'possibl':32,37 'post':151 'posts-exploit':150 'profil':109 'proper':20 'realli':52 'restrict':107 'rule':144 'run':73,133 'seccomp':108 'send':85 'set':142 'shell':159 'spawn':160 'step':153 'subpath':58 'syscal':118 'thing':7 'tool':44 'traffic':86 'updat':39 'use':22,55,68,81,104,122 'user':62 'volum':49 'want':92 'would':154"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/6473668"
+editedAt: null
+createdAt: DateTimeImmutable @1704620762 {#1629
date: 2024-01-07 10:46:02.0 +01:00
}
+"title": 288266
} |
|
Show voter details
|
15 |
DENIED
|
edit
|
App\Entity\EntryComment {#1628
+user: App\Entity\User {#261 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1626
+user: Proxies\__CG__\App\Entity\User {#2338 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2130 …}
+slug: "How-to-secure-podman-or-docker-containers-for-public-facing-hosting"
+title: "How to secure (podman or docker) containers for public-facing hosting?"
+url: null
+body: """
Context\n
-------\n
\n
I want to host public-facing applications on a server in my home, without compromising security. I realize containers might be one way to do this, and want to explore that route further.\n
\n
Requirements\n
------------\n
\n
I want to run applications within containers such that they\n
\n
- Must not be able to interfere with applications running on host\n
- Must not be able to interfere with other containers or applications inside them\n
- Must have no access or influence on other devices in the local network, or otherwise compromise the security of the network, but still accessible by devices via ssh.\n
\n
> Note: all of this within reason. I understand that sometimes there may be occasional vulnerabilities, like in kernel for example, that would eventually get fixed. Risks like this within reason I am willing to accept.\n
\n
What I found so far\n
-------------------\n
\n
- **Running containers in rootless mode:** in other words, running the container daemon with an unprivileged host user\n
- **Running applications in container under unprivileged users:** the container user under which the container is ran should be unprivileged\n
- **Networking:** The container’s networking must be restricted. I am still not sure how to do this and shall explore it more, but would appreciate any resources.\n
\n
Alternative solution\n
--------------------\n
\n
I have seen bubblewrap presented as an alternative, but it seems like it is not intended to be used directly in this manner, and information about using it for this is scarce.
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 21
+favouriteCount: 83
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1719138740 {#2337
date: 2024-06-23 12:32:20.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2159 …}
+votes: Doctrine\ORM\PersistentCollection {#2074 …}
+reports: Doctrine\ORM\PersistentCollection {#2071 …}
+favourites: Doctrine\ORM\PersistentCollection {#2070 …}
+notifications: Doctrine\ORM\PersistentCollection {#2048 …}
+badges: Doctrine\ORM\PersistentCollection {#2056 …}
+children: [
1 => App\Entity\EntryComment {#1628}
0 => App\Entity\EntryComment {#1737
+user: App\Entity\User {#261 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1626 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#1734 …}
+root: App\Entity\EntryComment {#1628}
+body: "It’s the de-facto standard for runtime container security (sysdig is based on it). The only competitor afaik is aqua security’s tracee, which is way less mature. It is very well supporter, there are tons of rules maintained by the community and it is a CNCF project used by enterprise solutions (I.e., shouldn’t disappear overnight)."
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704690575 {#1736
date: 2024-01-08 06:09:35.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@cyclohexane@lemmy.ml"
"@sudneo@lemmy.world"
"@krash@lemmy.ml"
]
+children: Doctrine\ORM\PersistentCollection {#1732 …}
+nested: Doctrine\ORM\PersistentCollection {#1735 …}
+votes: Doctrine\ORM\PersistentCollection {#1729 …}
+reports: Doctrine\ORM\PersistentCollection {#1719 …}
+favourites: Doctrine\ORM\PersistentCollection {#1714 …}
+notifications: Doctrine\ORM\PersistentCollection {#1720 …}
-id: 290565
-bodyTs: "'afaik':20 'aqua':22 'base':14 'cncf':49 'communiti':44 'competitor':19 'contain':10 'de':5 'de-facto':4 'disappear':58 'enterpris':53 'facto':6 'i.e':55 'less':29 'maintain':41 'matur':30 'overnight':59 'project':50 'rule':40 'runtim':9 'secur':11,23 'shouldn':56 'solut':54 'standard':7 'support':35 'sysdig':12 'ton':38 'trace':25 'use':51 'way':28 'well':34"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/6491825"
+editedAt: null
+createdAt: DateTimeImmutable @1704690575 {#1730
date: 2024-01-08 06:09:35.0 +01:00
}
+"title": 290565
}
]
-id: 27753
-titleTs: "'contain':7 'docker':6 'face':11 'host':12 'podman':4 'public':10 'public-fac':9 'secur':3"
-bodyTs: "'abl':50,61 'accept':133 'access':74,94 'altern':202,211 'applic':9,41,54,68,157 'appreci':199 'bubblewrap':207 'compromis':17,86 'contain':21,43,66,140,149,159,164,169,177 'context':1 'daemon':150 'devic':79,96 'direct':223 'eventu':121 'exampl':118 'explor':32,194 'face':8 'far':138 'fix':123 'found':136 'get':122 'home':15 'host':5,57,154 'influenc':76 'inform':228 'insid':69 'intend':219 'interfer':52,63 'kernel':116 'like':114,125,215 'local':82 'manner':226 'may':110 'might':22 'mode':143 'must':47,58,71,180 'network':83,91,175,179 'note':99 'occasion':112 'one':24 'otherwis':85 'present':208 'public':7 'public-fac':6 'ran':171 'realiz':20 'reason':104,128 'requir':36 'resourc':201 'restrict':182 'risk':124 'rootless':142 'rout':34 'run':40,55,139,147,156 'scarc':235 'secur':18,88 'seem':214 'seen':206 'server':12 'shall':193 'solut':203 'sometim':108 'ssh':98 'still':93,185 'sure':187 'understand':106 'unprivileg':153,161,174 'use':222,230 'user':155,162,165 'via':97 'vulner':113 'want':3,30,38 'way':25 'will':131 'within':42,103,127 'without':16 'word':146 'would':120,198"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704677667
+visibility: "visible "
+apId: "https://lemmy.ml/post/10216078"
+editedAt: DateTimeImmutable @1712598393 {#2079
date: 2024-04-08 19:46:33.0 +02:00
}
+createdAt: DateTimeImmutable @1704591267 {#2062
date: 2024-01-07 02:34:27.0 +01:00
}
+__isInitialized__: true
…2
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: null
+parent: null
+root: null
+body: """
You already mentioned the most important things.\n
\n
I will add, at the cost of being pedantic:\n
\n
- build the image properly, or use good images. This means limit dependencies as much as possible, as minimal images as possible (less updates due to CVEs, less tooling).\n
- do not mount host volumes, if you really have to, use a dedicated subpath owned by the user of the container. Do not use homedirs etc.\n
- do not run in host namespaces, like host network etc. Use port mapping to send traffic to the container.\n
\n
If you want to go hardcore:\n
\n
- analyze your application, and if feasible, build and use a more restrictive seccomp profile compared to the default. This might limit additional syscalls that might be used during an exploitation but that your app doesn’t need.\n
- run falco on the node. Even with the default set of rules (nothing custom), many exploitation or posts-exploitation steps would be caught, such as “shell spawned” etc.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 6
+score: 0
+lastActive: DateTime @1719122506 {#1630
date: 2024-06-23 08:01:46.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@cyclohexane@lemmy.ml"
]
+children: Doctrine\ORM\PersistentCollection {#1599 …}
+nested: Doctrine\ORM\PersistentCollection {#1625 …}
+votes: Doctrine\ORM\PersistentCollection {#1617 …}
+reports: Doctrine\ORM\PersistentCollection {#1725 …}
+favourites: Doctrine\ORM\PersistentCollection {#1722 …}
+notifications: Doctrine\ORM\PersistentCollection {#1726 …}
-id: 288266
-bodyTs: "'add':10 'addit':117 'alreadi':2 'analyz':96 'app':129 'applic':98 'build':17,102 'caught':156 'compar':110 'contain':65,89 'cost':13 'custom':146 'cves':42 'dedic':57 'default':113,141 'depend':28 'doesn':130 'due':40 'etc':70,80,161 'even':138 'exploit':125,148,152 'falco':134 'feasibl':101 'go':94 'good':23 'hardcor':95 'homedir':69 'host':48,75,78 'imag':19,24,35 'import':6 'less':38,43 'like':77 'limit':27,116 'mani':147 'map':83 'mean':26 'mention':3 'might':115,120 'minim':34 'mount':47 'much':30 'namespac':76 'need':132 'network':79 'node':137 'noth':145 'own':59 'pedant':16 'port':82 'possibl':32,37 'post':151 'posts-exploit':150 'profil':109 'proper':20 'realli':52 'restrict':107 'rule':144 'run':73,133 'seccomp':108 'send':85 'set':142 'shell':159 'spawn':160 'step':153 'subpath':58 'syscal':118 'thing':7 'tool':44 'traffic':86 'updat':39 'use':22,55,68,81,104,122 'user':62 'volum':49 'want':92 'would':154"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/6473668"
+editedAt: null
+createdAt: DateTimeImmutable @1704620762 {#1629
date: 2024-01-07 10:46:02.0 +01:00
}
+"title": 288266
} |
|
Show voter details
|
16 |
DENIED
|
moderate
|
App\Entity\EntryComment {#1628
+user: App\Entity\User {#261 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1626
+user: Proxies\__CG__\App\Entity\User {#2338 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2130 …}
+slug: "How-to-secure-podman-or-docker-containers-for-public-facing-hosting"
+title: "How to secure (podman or docker) containers for public-facing hosting?"
+url: null
+body: """
Context\n
-------\n
\n
I want to host public-facing applications on a server in my home, without compromising security. I realize containers might be one way to do this, and want to explore that route further.\n
\n
Requirements\n
------------\n
\n
I want to run applications within containers such that they\n
\n
- Must not be able to interfere with applications running on host\n
- Must not be able to interfere with other containers or applications inside them\n
- Must have no access or influence on other devices in the local network, or otherwise compromise the security of the network, but still accessible by devices via ssh.\n
\n
> Note: all of this within reason. I understand that sometimes there may be occasional vulnerabilities, like in kernel for example, that would eventually get fixed. Risks like this within reason I am willing to accept.\n
\n
What I found so far\n
-------------------\n
\n
- **Running containers in rootless mode:** in other words, running the container daemon with an unprivileged host user\n
- **Running applications in container under unprivileged users:** the container user under which the container is ran should be unprivileged\n
- **Networking:** The container’s networking must be restricted. I am still not sure how to do this and shall explore it more, but would appreciate any resources.\n
\n
Alternative solution\n
--------------------\n
\n
I have seen bubblewrap presented as an alternative, but it seems like it is not intended to be used directly in this manner, and information about using it for this is scarce.
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 21
+favouriteCount: 83
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1719138740 {#2337
date: 2024-06-23 12:32:20.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2159 …}
+votes: Doctrine\ORM\PersistentCollection {#2074 …}
+reports: Doctrine\ORM\PersistentCollection {#2071 …}
+favourites: Doctrine\ORM\PersistentCollection {#2070 …}
+notifications: Doctrine\ORM\PersistentCollection {#2048 …}
+badges: Doctrine\ORM\PersistentCollection {#2056 …}
+children: [
1 => App\Entity\EntryComment {#1628}
0 => App\Entity\EntryComment {#1737
+user: App\Entity\User {#261 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1626 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#1734 …}
+root: App\Entity\EntryComment {#1628}
+body: "It’s the de-facto standard for runtime container security (sysdig is based on it). The only competitor afaik is aqua security’s tracee, which is way less mature. It is very well supporter, there are tons of rules maintained by the community and it is a CNCF project used by enterprise solutions (I.e., shouldn’t disappear overnight)."
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704690575 {#1736
date: 2024-01-08 06:09:35.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@cyclohexane@lemmy.ml"
"@sudneo@lemmy.world"
"@krash@lemmy.ml"
]
+children: Doctrine\ORM\PersistentCollection {#1732 …}
+nested: Doctrine\ORM\PersistentCollection {#1735 …}
+votes: Doctrine\ORM\PersistentCollection {#1729 …}
+reports: Doctrine\ORM\PersistentCollection {#1719 …}
+favourites: Doctrine\ORM\PersistentCollection {#1714 …}
+notifications: Doctrine\ORM\PersistentCollection {#1720 …}
-id: 290565
-bodyTs: "'afaik':20 'aqua':22 'base':14 'cncf':49 'communiti':44 'competitor':19 'contain':10 'de':5 'de-facto':4 'disappear':58 'enterpris':53 'facto':6 'i.e':55 'less':29 'maintain':41 'matur':30 'overnight':59 'project':50 'rule':40 'runtim':9 'secur':11,23 'shouldn':56 'solut':54 'standard':7 'support':35 'sysdig':12 'ton':38 'trace':25 'use':51 'way':28 'well':34"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/6491825"
+editedAt: null
+createdAt: DateTimeImmutable @1704690575 {#1730
date: 2024-01-08 06:09:35.0 +01:00
}
+"title": 290565
}
]
-id: 27753
-titleTs: "'contain':7 'docker':6 'face':11 'host':12 'podman':4 'public':10 'public-fac':9 'secur':3"
-bodyTs: "'abl':50,61 'accept':133 'access':74,94 'altern':202,211 'applic':9,41,54,68,157 'appreci':199 'bubblewrap':207 'compromis':17,86 'contain':21,43,66,140,149,159,164,169,177 'context':1 'daemon':150 'devic':79,96 'direct':223 'eventu':121 'exampl':118 'explor':32,194 'face':8 'far':138 'fix':123 'found':136 'get':122 'home':15 'host':5,57,154 'influenc':76 'inform':228 'insid':69 'intend':219 'interfer':52,63 'kernel':116 'like':114,125,215 'local':82 'manner':226 'may':110 'might':22 'mode':143 'must':47,58,71,180 'network':83,91,175,179 'note':99 'occasion':112 'one':24 'otherwis':85 'present':208 'public':7 'public-fac':6 'ran':171 'realiz':20 'reason':104,128 'requir':36 'resourc':201 'restrict':182 'risk':124 'rootless':142 'rout':34 'run':40,55,139,147,156 'scarc':235 'secur':18,88 'seem':214 'seen':206 'server':12 'shall':193 'solut':203 'sometim':108 'ssh':98 'still':93,185 'sure':187 'understand':106 'unprivileg':153,161,174 'use':222,230 'user':155,162,165 'via':97 'vulner':113 'want':3,30,38 'way':25 'will':131 'within':42,103,127 'without':16 'word':146 'would':120,198"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704677667
+visibility: "visible "
+apId: "https://lemmy.ml/post/10216078"
+editedAt: DateTimeImmutable @1712598393 {#2079
date: 2024-04-08 19:46:33.0 +02:00
}
+createdAt: DateTimeImmutable @1704591267 {#2062
date: 2024-01-07 02:34:27.0 +01:00
}
+__isInitialized__: true
…2
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: null
+parent: null
+root: null
+body: """
You already mentioned the most important things.\n
\n
I will add, at the cost of being pedantic:\n
\n
- build the image properly, or use good images. This means limit dependencies as much as possible, as minimal images as possible (less updates due to CVEs, less tooling).\n
- do not mount host volumes, if you really have to, use a dedicated subpath owned by the user of the container. Do not use homedirs etc.\n
- do not run in host namespaces, like host network etc. Use port mapping to send traffic to the container.\n
\n
If you want to go hardcore:\n
\n
- analyze your application, and if feasible, build and use a more restrictive seccomp profile compared to the default. This might limit additional syscalls that might be used during an exploitation but that your app doesn’t need.\n
- run falco on the node. Even with the default set of rules (nothing custom), many exploitation or posts-exploitation steps would be caught, such as “shell spawned” etc.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 6
+score: 0
+lastActive: DateTime @1719122506 {#1630
date: 2024-06-23 08:01:46.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@cyclohexane@lemmy.ml"
]
+children: Doctrine\ORM\PersistentCollection {#1599 …}
+nested: Doctrine\ORM\PersistentCollection {#1625 …}
+votes: Doctrine\ORM\PersistentCollection {#1617 …}
+reports: Doctrine\ORM\PersistentCollection {#1725 …}
+favourites: Doctrine\ORM\PersistentCollection {#1722 …}
+notifications: Doctrine\ORM\PersistentCollection {#1726 …}
-id: 288266
-bodyTs: "'add':10 'addit':117 'alreadi':2 'analyz':96 'app':129 'applic':98 'build':17,102 'caught':156 'compar':110 'contain':65,89 'cost':13 'custom':146 'cves':42 'dedic':57 'default':113,141 'depend':28 'doesn':130 'due':40 'etc':70,80,161 'even':138 'exploit':125,148,152 'falco':134 'feasibl':101 'go':94 'good':23 'hardcor':95 'homedir':69 'host':48,75,78 'imag':19,24,35 'import':6 'less':38,43 'like':77 'limit':27,116 'mani':147 'map':83 'mean':26 'mention':3 'might':115,120 'minim':34 'mount':47 'much':30 'namespac':76 'need':132 'network':79 'node':137 'noth':145 'own':59 'pedant':16 'port':82 'possibl':32,37 'post':151 'posts-exploit':150 'profil':109 'proper':20 'realli':52 'restrict':107 'rule':144 'run':73,133 'seccomp':108 'send':85 'set':142 'shell':159 'spawn':160 'step':153 'subpath':58 'syscal':118 'thing':7 'tool':44 'traffic':86 'updat':39 'use':22,55,68,81,104,122 'user':62 'volum':49 'want':92 'would':154"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/6473668"
+editedAt: null
+createdAt: DateTimeImmutable @1704620762 {#1629
date: 2024-01-07 10:46:02.0 +01:00
}
+"title": 288266
} |
|
Show voter details
|
17 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
18 |
DENIED
|
moderate
|
App\Entity\EntryComment {#1737
+user: App\Entity\User {#261 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1626
+user: Proxies\__CG__\App\Entity\User {#2338 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2130 …}
+slug: "How-to-secure-podman-or-docker-containers-for-public-facing-hosting"
+title: "How to secure (podman or docker) containers for public-facing hosting?"
+url: null
+body: """
Context\n
-------\n
\n
I want to host public-facing applications on a server in my home, without compromising security. I realize containers might be one way to do this, and want to explore that route further.\n
\n
Requirements\n
------------\n
\n
I want to run applications within containers such that they\n
\n
- Must not be able to interfere with applications running on host\n
- Must not be able to interfere with other containers or applications inside them\n
- Must have no access or influence on other devices in the local network, or otherwise compromise the security of the network, but still accessible by devices via ssh.\n
\n
> Note: all of this within reason. I understand that sometimes there may be occasional vulnerabilities, like in kernel for example, that would eventually get fixed. Risks like this within reason I am willing to accept.\n
\n
What I found so far\n
-------------------\n
\n
- **Running containers in rootless mode:** in other words, running the container daemon with an unprivileged host user\n
- **Running applications in container under unprivileged users:** the container user under which the container is ran should be unprivileged\n
- **Networking:** The container’s networking must be restricted. I am still not sure how to do this and shall explore it more, but would appreciate any resources.\n
\n
Alternative solution\n
--------------------\n
\n
I have seen bubblewrap presented as an alternative, but it seems like it is not intended to be used directly in this manner, and information about using it for this is scarce.
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 21
+favouriteCount: 83
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1719138740 {#2337
date: 2024-06-23 12:32:20.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2159 …}
+votes: Doctrine\ORM\PersistentCollection {#2074 …}
+reports: Doctrine\ORM\PersistentCollection {#2071 …}
+favourites: Doctrine\ORM\PersistentCollection {#2070 …}
+notifications: Doctrine\ORM\PersistentCollection {#2048 …}
+badges: Doctrine\ORM\PersistentCollection {#2056 …}
+children: [
1 => App\Entity\EntryComment {#1628
+user: App\Entity\User {#261 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1626 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: null
+parent: null
+root: null
+body: """
You already mentioned the most important things.\n
\n
I will add, at the cost of being pedantic:\n
\n
- build the image properly, or use good images. This means limit dependencies as much as possible, as minimal images as possible (less updates due to CVEs, less tooling).\n
- do not mount host volumes, if you really have to, use a dedicated subpath owned by the user of the container. Do not use homedirs etc.\n
- do not run in host namespaces, like host network etc. Use port mapping to send traffic to the container.\n
\n
If you want to go hardcore:\n
\n
- analyze your application, and if feasible, build and use a more restrictive seccomp profile compared to the default. This might limit additional syscalls that might be used during an exploitation but that your app doesn’t need.\n
- run falco on the node. Even with the default set of rules (nothing custom), many exploitation or posts-exploitation steps would be caught, such as “shell spawned” etc.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 6
+score: 0
+lastActive: DateTime @1719122506 {#1630
date: 2024-06-23 08:01:46.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@cyclohexane@lemmy.ml"
]
+children: Doctrine\ORM\PersistentCollection {#1599 …}
+nested: Doctrine\ORM\PersistentCollection {#1625 …}
+votes: Doctrine\ORM\PersistentCollection {#1617 …}
+reports: Doctrine\ORM\PersistentCollection {#1725 …}
+favourites: Doctrine\ORM\PersistentCollection {#1722 …}
+notifications: Doctrine\ORM\PersistentCollection {#1726 …}
-id: 288266
-bodyTs: "'add':10 'addit':117 'alreadi':2 'analyz':96 'app':129 'applic':98 'build':17,102 'caught':156 'compar':110 'contain':65,89 'cost':13 'custom':146 'cves':42 'dedic':57 'default':113,141 'depend':28 'doesn':130 'due':40 'etc':70,80,161 'even':138 'exploit':125,148,152 'falco':134 'feasibl':101 'go':94 'good':23 'hardcor':95 'homedir':69 'host':48,75,78 'imag':19,24,35 'import':6 'less':38,43 'like':77 'limit':27,116 'mani':147 'map':83 'mean':26 'mention':3 'might':115,120 'minim':34 'mount':47 'much':30 'namespac':76 'need':132 'network':79 'node':137 'noth':145 'own':59 'pedant':16 'port':82 'possibl':32,37 'post':151 'posts-exploit':150 'profil':109 'proper':20 'realli':52 'restrict':107 'rule':144 'run':73,133 'seccomp':108 'send':85 'set':142 'shell':159 'spawn':160 'step':153 'subpath':58 'syscal':118 'thing':7 'tool':44 'traffic':86 'updat':39 'use':22,55,68,81,104,122 'user':62 'volum':49 'want':92 'would':154"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/6473668"
+editedAt: null
+createdAt: DateTimeImmutable @1704620762 {#1629
date: 2024-01-07 10:46:02.0 +01:00
}
+"title": 288266
}
0 => App\Entity\EntryComment {#1737}
]
-id: 27753
-titleTs: "'contain':7 'docker':6 'face':11 'host':12 'podman':4 'public':10 'public-fac':9 'secur':3"
-bodyTs: "'abl':50,61 'accept':133 'access':74,94 'altern':202,211 'applic':9,41,54,68,157 'appreci':199 'bubblewrap':207 'compromis':17,86 'contain':21,43,66,140,149,159,164,169,177 'context':1 'daemon':150 'devic':79,96 'direct':223 'eventu':121 'exampl':118 'explor':32,194 'face':8 'far':138 'fix':123 'found':136 'get':122 'home':15 'host':5,57,154 'influenc':76 'inform':228 'insid':69 'intend':219 'interfer':52,63 'kernel':116 'like':114,125,215 'local':82 'manner':226 'may':110 'might':22 'mode':143 'must':47,58,71,180 'network':83,91,175,179 'note':99 'occasion':112 'one':24 'otherwis':85 'present':208 'public':7 'public-fac':6 'ran':171 'realiz':20 'reason':104,128 'requir':36 'resourc':201 'restrict':182 'risk':124 'rootless':142 'rout':34 'run':40,55,139,147,156 'scarc':235 'secur':18,88 'seem':214 'seen':206 'server':12 'shall':193 'solut':203 'sometim':108 'ssh':98 'still':93,185 'sure':187 'understand':106 'unprivileg':153,161,174 'use':222,230 'user':155,162,165 'via':97 'vulner':113 'want':3,30,38 'way':25 'will':131 'within':42,103,127 'without':16 'word':146 'would':120,198"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704677667
+visibility: "visible "
+apId: "https://lemmy.ml/post/10216078"
+editedAt: DateTimeImmutable @1712598393 {#2079
date: 2024-04-08 19:46:33.0 +02:00
}
+createdAt: DateTimeImmutable @1704591267 {#2062
date: 2024-01-07 02:34:27.0 +01:00
}
+__isInitialized__: true
…2
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#1734 …}
+root: App\Entity\EntryComment {#1628}
+body: "It’s the de-facto standard for runtime container security (sysdig is based on it). The only competitor afaik is aqua security’s tracee, which is way less mature. It is very well supporter, there are tons of rules maintained by the community and it is a CNCF project used by enterprise solutions (I.e., shouldn’t disappear overnight)."
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704690575 {#1736
date: 2024-01-08 06:09:35.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@cyclohexane@lemmy.ml"
"@sudneo@lemmy.world"
"@krash@lemmy.ml"
]
+children: Doctrine\ORM\PersistentCollection {#1732 …}
+nested: Doctrine\ORM\PersistentCollection {#1735 …}
+votes: Doctrine\ORM\PersistentCollection {#1729 …}
+reports: Doctrine\ORM\PersistentCollection {#1719 …}
+favourites: Doctrine\ORM\PersistentCollection {#1714 …}
+notifications: Doctrine\ORM\PersistentCollection {#1720 …}
-id: 290565
-bodyTs: "'afaik':20 'aqua':22 'base':14 'cncf':49 'communiti':44 'competitor':19 'contain':10 'de':5 'de-facto':4 'disappear':58 'enterpris':53 'facto':6 'i.e':55 'less':29 'maintain':41 'matur':30 'overnight':59 'project':50 'rule':40 'runtim':9 'secur':11,23 'shouldn':56 'solut':54 'standard':7 'support':35 'sysdig':12 'ton':38 'trace':25 'use':51 'way':28 'well':34"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/6491825"
+editedAt: null
+createdAt: DateTimeImmutable @1704690575 {#1730
date: 2024-01-08 06:09:35.0 +01:00
}
+"title": 290565
} |
|
Show voter details
|
19 |
DENIED
|
edit
|
App\Entity\EntryComment {#1737
+user: App\Entity\User {#261 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1626
+user: Proxies\__CG__\App\Entity\User {#2338 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2130 …}
+slug: "How-to-secure-podman-or-docker-containers-for-public-facing-hosting"
+title: "How to secure (podman or docker) containers for public-facing hosting?"
+url: null
+body: """
Context\n
-------\n
\n
I want to host public-facing applications on a server in my home, without compromising security. I realize containers might be one way to do this, and want to explore that route further.\n
\n
Requirements\n
------------\n
\n
I want to run applications within containers such that they\n
\n
- Must not be able to interfere with applications running on host\n
- Must not be able to interfere with other containers or applications inside them\n
- Must have no access or influence on other devices in the local network, or otherwise compromise the security of the network, but still accessible by devices via ssh.\n
\n
> Note: all of this within reason. I understand that sometimes there may be occasional vulnerabilities, like in kernel for example, that would eventually get fixed. Risks like this within reason I am willing to accept.\n
\n
What I found so far\n
-------------------\n
\n
- **Running containers in rootless mode:** in other words, running the container daemon with an unprivileged host user\n
- **Running applications in container under unprivileged users:** the container user under which the container is ran should be unprivileged\n
- **Networking:** The container’s networking must be restricted. I am still not sure how to do this and shall explore it more, but would appreciate any resources.\n
\n
Alternative solution\n
--------------------\n
\n
I have seen bubblewrap presented as an alternative, but it seems like it is not intended to be used directly in this manner, and information about using it for this is scarce.
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 21
+favouriteCount: 83
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1719138740 {#2337
date: 2024-06-23 12:32:20.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2159 …}
+votes: Doctrine\ORM\PersistentCollection {#2074 …}
+reports: Doctrine\ORM\PersistentCollection {#2071 …}
+favourites: Doctrine\ORM\PersistentCollection {#2070 …}
+notifications: Doctrine\ORM\PersistentCollection {#2048 …}
+badges: Doctrine\ORM\PersistentCollection {#2056 …}
+children: [
1 => App\Entity\EntryComment {#1628
+user: App\Entity\User {#261 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1626 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: null
+parent: null
+root: null
+body: """
You already mentioned the most important things.\n
\n
I will add, at the cost of being pedantic:\n
\n
- build the image properly, or use good images. This means limit dependencies as much as possible, as minimal images as possible (less updates due to CVEs, less tooling).\n
- do not mount host volumes, if you really have to, use a dedicated subpath owned by the user of the container. Do not use homedirs etc.\n
- do not run in host namespaces, like host network etc. Use port mapping to send traffic to the container.\n
\n
If you want to go hardcore:\n
\n
- analyze your application, and if feasible, build and use a more restrictive seccomp profile compared to the default. This might limit additional syscalls that might be used during an exploitation but that your app doesn’t need.\n
- run falco on the node. Even with the default set of rules (nothing custom), many exploitation or posts-exploitation steps would be caught, such as “shell spawned” etc.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 6
+score: 0
+lastActive: DateTime @1719122506 {#1630
date: 2024-06-23 08:01:46.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@cyclohexane@lemmy.ml"
]
+children: Doctrine\ORM\PersistentCollection {#1599 …}
+nested: Doctrine\ORM\PersistentCollection {#1625 …}
+votes: Doctrine\ORM\PersistentCollection {#1617 …}
+reports: Doctrine\ORM\PersistentCollection {#1725 …}
+favourites: Doctrine\ORM\PersistentCollection {#1722 …}
+notifications: Doctrine\ORM\PersistentCollection {#1726 …}
-id: 288266
-bodyTs: "'add':10 'addit':117 'alreadi':2 'analyz':96 'app':129 'applic':98 'build':17,102 'caught':156 'compar':110 'contain':65,89 'cost':13 'custom':146 'cves':42 'dedic':57 'default':113,141 'depend':28 'doesn':130 'due':40 'etc':70,80,161 'even':138 'exploit':125,148,152 'falco':134 'feasibl':101 'go':94 'good':23 'hardcor':95 'homedir':69 'host':48,75,78 'imag':19,24,35 'import':6 'less':38,43 'like':77 'limit':27,116 'mani':147 'map':83 'mean':26 'mention':3 'might':115,120 'minim':34 'mount':47 'much':30 'namespac':76 'need':132 'network':79 'node':137 'noth':145 'own':59 'pedant':16 'port':82 'possibl':32,37 'post':151 'posts-exploit':150 'profil':109 'proper':20 'realli':52 'restrict':107 'rule':144 'run':73,133 'seccomp':108 'send':85 'set':142 'shell':159 'spawn':160 'step':153 'subpath':58 'syscal':118 'thing':7 'tool':44 'traffic':86 'updat':39 'use':22,55,68,81,104,122 'user':62 'volum':49 'want':92 'would':154"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/6473668"
+editedAt: null
+createdAt: DateTimeImmutable @1704620762 {#1629
date: 2024-01-07 10:46:02.0 +01:00
}
+"title": 288266
}
0 => App\Entity\EntryComment {#1737}
]
-id: 27753
-titleTs: "'contain':7 'docker':6 'face':11 'host':12 'podman':4 'public':10 'public-fac':9 'secur':3"
-bodyTs: "'abl':50,61 'accept':133 'access':74,94 'altern':202,211 'applic':9,41,54,68,157 'appreci':199 'bubblewrap':207 'compromis':17,86 'contain':21,43,66,140,149,159,164,169,177 'context':1 'daemon':150 'devic':79,96 'direct':223 'eventu':121 'exampl':118 'explor':32,194 'face':8 'far':138 'fix':123 'found':136 'get':122 'home':15 'host':5,57,154 'influenc':76 'inform':228 'insid':69 'intend':219 'interfer':52,63 'kernel':116 'like':114,125,215 'local':82 'manner':226 'may':110 'might':22 'mode':143 'must':47,58,71,180 'network':83,91,175,179 'note':99 'occasion':112 'one':24 'otherwis':85 'present':208 'public':7 'public-fac':6 'ran':171 'realiz':20 'reason':104,128 'requir':36 'resourc':201 'restrict':182 'risk':124 'rootless':142 'rout':34 'run':40,55,139,147,156 'scarc':235 'secur':18,88 'seem':214 'seen':206 'server':12 'shall':193 'solut':203 'sometim':108 'ssh':98 'still':93,185 'sure':187 'understand':106 'unprivileg':153,161,174 'use':222,230 'user':155,162,165 'via':97 'vulner':113 'want':3,30,38 'way':25 'will':131 'within':42,103,127 'without':16 'word':146 'would':120,198"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704677667
+visibility: "visible "
+apId: "https://lemmy.ml/post/10216078"
+editedAt: DateTimeImmutable @1712598393 {#2079
date: 2024-04-08 19:46:33.0 +02:00
}
+createdAt: DateTimeImmutable @1704591267 {#2062
date: 2024-01-07 02:34:27.0 +01:00
}
+__isInitialized__: true
…2
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#1734 …}
+root: App\Entity\EntryComment {#1628}
+body: "It’s the de-facto standard for runtime container security (sysdig is based on it). The only competitor afaik is aqua security’s tracee, which is way less mature. It is very well supporter, there are tons of rules maintained by the community and it is a CNCF project used by enterprise solutions (I.e., shouldn’t disappear overnight)."
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704690575 {#1736
date: 2024-01-08 06:09:35.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@cyclohexane@lemmy.ml"
"@sudneo@lemmy.world"
"@krash@lemmy.ml"
]
+children: Doctrine\ORM\PersistentCollection {#1732 …}
+nested: Doctrine\ORM\PersistentCollection {#1735 …}
+votes: Doctrine\ORM\PersistentCollection {#1729 …}
+reports: Doctrine\ORM\PersistentCollection {#1719 …}
+favourites: Doctrine\ORM\PersistentCollection {#1714 …}
+notifications: Doctrine\ORM\PersistentCollection {#1720 …}
-id: 290565
-bodyTs: "'afaik':20 'aqua':22 'base':14 'cncf':49 'communiti':44 'competitor':19 'contain':10 'de':5 'de-facto':4 'disappear':58 'enterpris':53 'facto':6 'i.e':55 'less':29 'maintain':41 'matur':30 'overnight':59 'project':50 'rule':40 'runtim':9 'secur':11,23 'shouldn':56 'solut':54 'standard':7 'support':35 'sysdig':12 'ton':38 'trace':25 'use':51 'way':28 'well':34"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/6491825"
+editedAt: null
+createdAt: DateTimeImmutable @1704690575 {#1730
date: 2024-01-08 06:09:35.0 +01:00
}
+"title": 290565
} |
|
Show voter details
|
20 |
DENIED
|
moderate
|
App\Entity\EntryComment {#1737
+user: App\Entity\User {#261 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1626
+user: Proxies\__CG__\App\Entity\User {#2338 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2130 …}
+slug: "How-to-secure-podman-or-docker-containers-for-public-facing-hosting"
+title: "How to secure (podman or docker) containers for public-facing hosting?"
+url: null
+body: """
Context\n
-------\n
\n
I want to host public-facing applications on a server in my home, without compromising security. I realize containers might be one way to do this, and want to explore that route further.\n
\n
Requirements\n
------------\n
\n
I want to run applications within containers such that they\n
\n
- Must not be able to interfere with applications running on host\n
- Must not be able to interfere with other containers or applications inside them\n
- Must have no access or influence on other devices in the local network, or otherwise compromise the security of the network, but still accessible by devices via ssh.\n
\n
> Note: all of this within reason. I understand that sometimes there may be occasional vulnerabilities, like in kernel for example, that would eventually get fixed. Risks like this within reason I am willing to accept.\n
\n
What I found so far\n
-------------------\n
\n
- **Running containers in rootless mode:** in other words, running the container daemon with an unprivileged host user\n
- **Running applications in container under unprivileged users:** the container user under which the container is ran should be unprivileged\n
- **Networking:** The container’s networking must be restricted. I am still not sure how to do this and shall explore it more, but would appreciate any resources.\n
\n
Alternative solution\n
--------------------\n
\n
I have seen bubblewrap presented as an alternative, but it seems like it is not intended to be used directly in this manner, and information about using it for this is scarce.
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 21
+favouriteCount: 83
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1719138740 {#2337
date: 2024-06-23 12:32:20.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2159 …}
+votes: Doctrine\ORM\PersistentCollection {#2074 …}
+reports: Doctrine\ORM\PersistentCollection {#2071 …}
+favourites: Doctrine\ORM\PersistentCollection {#2070 …}
+notifications: Doctrine\ORM\PersistentCollection {#2048 …}
+badges: Doctrine\ORM\PersistentCollection {#2056 …}
+children: [
1 => App\Entity\EntryComment {#1628
+user: App\Entity\User {#261 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1626 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: null
+parent: null
+root: null
+body: """
You already mentioned the most important things.\n
\n
I will add, at the cost of being pedantic:\n
\n
- build the image properly, or use good images. This means limit dependencies as much as possible, as minimal images as possible (less updates due to CVEs, less tooling).\n
- do not mount host volumes, if you really have to, use a dedicated subpath owned by the user of the container. Do not use homedirs etc.\n
- do not run in host namespaces, like host network etc. Use port mapping to send traffic to the container.\n
\n
If you want to go hardcore:\n
\n
- analyze your application, and if feasible, build and use a more restrictive seccomp profile compared to the default. This might limit additional syscalls that might be used during an exploitation but that your app doesn’t need.\n
- run falco on the node. Even with the default set of rules (nothing custom), many exploitation or posts-exploitation steps would be caught, such as “shell spawned” etc.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 6
+score: 0
+lastActive: DateTime @1719122506 {#1630
date: 2024-06-23 08:01:46.0 +02:00
}
+ip: null
+tags: null
+mentions: [
"@cyclohexane@lemmy.ml"
]
+children: Doctrine\ORM\PersistentCollection {#1599 …}
+nested: Doctrine\ORM\PersistentCollection {#1625 …}
+votes: Doctrine\ORM\PersistentCollection {#1617 …}
+reports: Doctrine\ORM\PersistentCollection {#1725 …}
+favourites: Doctrine\ORM\PersistentCollection {#1722 …}
+notifications: Doctrine\ORM\PersistentCollection {#1726 …}
-id: 288266
-bodyTs: "'add':10 'addit':117 'alreadi':2 'analyz':96 'app':129 'applic':98 'build':17,102 'caught':156 'compar':110 'contain':65,89 'cost':13 'custom':146 'cves':42 'dedic':57 'default':113,141 'depend':28 'doesn':130 'due':40 'etc':70,80,161 'even':138 'exploit':125,148,152 'falco':134 'feasibl':101 'go':94 'good':23 'hardcor':95 'homedir':69 'host':48,75,78 'imag':19,24,35 'import':6 'less':38,43 'like':77 'limit':27,116 'mani':147 'map':83 'mean':26 'mention':3 'might':115,120 'minim':34 'mount':47 'much':30 'namespac':76 'need':132 'network':79 'node':137 'noth':145 'own':59 'pedant':16 'port':82 'possibl':32,37 'post':151 'posts-exploit':150 'profil':109 'proper':20 'realli':52 'restrict':107 'rule':144 'run':73,133 'seccomp':108 'send':85 'set':142 'shell':159 'spawn':160 'step':153 'subpath':58 'syscal':118 'thing':7 'tool':44 'traffic':86 'updat':39 'use':22,55,68,81,104,122 'user':62 'volum':49 'want':92 'would':154"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/6473668"
+editedAt: null
+createdAt: DateTimeImmutable @1704620762 {#1629
date: 2024-01-07 10:46:02.0 +01:00
}
+"title": 288266
}
0 => App\Entity\EntryComment {#1737}
]
-id: 27753
-titleTs: "'contain':7 'docker':6 'face':11 'host':12 'podman':4 'public':10 'public-fac':9 'secur':3"
-bodyTs: "'abl':50,61 'accept':133 'access':74,94 'altern':202,211 'applic':9,41,54,68,157 'appreci':199 'bubblewrap':207 'compromis':17,86 'contain':21,43,66,140,149,159,164,169,177 'context':1 'daemon':150 'devic':79,96 'direct':223 'eventu':121 'exampl':118 'explor':32,194 'face':8 'far':138 'fix':123 'found':136 'get':122 'home':15 'host':5,57,154 'influenc':76 'inform':228 'insid':69 'intend':219 'interfer':52,63 'kernel':116 'like':114,125,215 'local':82 'manner':226 'may':110 'might':22 'mode':143 'must':47,58,71,180 'network':83,91,175,179 'note':99 'occasion':112 'one':24 'otherwis':85 'present':208 'public':7 'public-fac':6 'ran':171 'realiz':20 'reason':104,128 'requir':36 'resourc':201 'restrict':182 'risk':124 'rootless':142 'rout':34 'run':40,55,139,147,156 'scarc':235 'secur':18,88 'seem':214 'seen':206 'server':12 'shall':193 'solut':203 'sometim':108 'ssh':98 'still':93,185 'sure':187 'understand':106 'unprivileg':153,161,174 'use':222,230 'user':155,162,165 'via':97 'vulner':113 'want':3,30,38 'way':25 'will':131 'within':42,103,127 'without':16 'word':146 'would':120,198"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704677667
+visibility: "visible "
+apId: "https://lemmy.ml/post/10216078"
+editedAt: DateTimeImmutable @1712598393 {#2079
date: 2024-04-08 19:46:33.0 +02:00
}
+createdAt: DateTimeImmutable @1704591267 {#2062
date: 2024-01-07 02:34:27.0 +01:00
}
+__isInitialized__: true
…2
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#1734 …}
+root: App\Entity\EntryComment {#1628}
+body: "It’s the de-facto standard for runtime container security (sysdig is based on it). The only competitor afaik is aqua security’s tracee, which is way less mature. It is very well supporter, there are tons of rules maintained by the community and it is a CNCF project used by enterprise solutions (I.e., shouldn’t disappear overnight)."
+lang: "en"
+isAdult: false
+favouriteCount: 1
+score: 0
+lastActive: DateTime @1704690575 {#1736
date: 2024-01-08 06:09:35.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@cyclohexane@lemmy.ml"
"@sudneo@lemmy.world"
"@krash@lemmy.ml"
]
+children: Doctrine\ORM\PersistentCollection {#1732 …}
+nested: Doctrine\ORM\PersistentCollection {#1735 …}
+votes: Doctrine\ORM\PersistentCollection {#1729 …}
+reports: Doctrine\ORM\PersistentCollection {#1719 …}
+favourites: Doctrine\ORM\PersistentCollection {#1714 …}
+notifications: Doctrine\ORM\PersistentCollection {#1720 …}
-id: 290565
-bodyTs: "'afaik':20 'aqua':22 'base':14 'cncf':49 'communiti':44 'competitor':19 'contain':10 'de':5 'de-facto':4 'disappear':58 'enterpris':53 'facto':6 'i.e':55 'less':29 'maintain':41 'matur':30 'overnight':59 'project':50 'rule':40 'runtim':9 'secur':11,23 'shouldn':56 'solut':54 'standard':7 'support':35 'sysdig':12 'ton':38 'trace':25 'use':51 'way':28 'well':34"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/6491825"
+editedAt: null
+createdAt: DateTimeImmutable @1704690575 {#1730
date: 2024-01-08 06:09:35.0 +01:00
}
+"title": 290565
} |
|
Show voter details
|
21 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
22 |
DENIED
|
moderate
|
Proxies\__CG__\App\Entity\Entry {#1619
+user: Proxies\__CG__\App\Entity\User {#2055 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1702 …}
+image: Proxies\__CG__\App\Entity\Image {#2107 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2110 …}
+slug: "Stalwart-v0-5-0"
+title: "Stalwart v0.5.0"
+url: "https://stalw.art/blog/storage-performance/"
+body: """
**Elevating Performance and Flexibility**\n
\n
We are excited to announce the release of Stalwart Mail Server v0.5.0. As we approach the end of the year, this significant update marks a major advancement in our journey to provide a robust, efficient, and versatile mail server solution. This latest version incorporates a range of performance enhancements, storage layer improvements, and new features, designed to elevate your email server experience.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 40
+favouriteCount: 119
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1720677469 {#2046
date: 2024-07-11 07:57:49.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2106 …}
+votes: Doctrine\ORM\PersistentCollection {#2117 …}
+reports: Doctrine\ORM\PersistentCollection {#2112 …}
+favourites: Doctrine\ORM\PersistentCollection {#2118 …}
+notifications: Doctrine\ORM\PersistentCollection {#2122 …}
+badges: Doctrine\ORM\PersistentCollection {#2113 …}
+children: [
App\Entity\EntryComment {#1596
+user: App\Entity\User {#261 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1619 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1702 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#1701 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#1683 …}
+body: """
I don’t think it’s you, it generally is a bad practice to have multiple processes inside a container. It usually defeats most of the isolation, introduces problems with handling zombie processes (therefore you need an init) and restarting tools when they crash (then you need something like supervisord, which I guess this image might use - I didn’t check). Each software adds dependencies, which can conflict (again defeating the idea of containers), and of course CVEs. Then you have a problem with users etc.\n
\n
So yeah, containers are generally not meant to be used this way. The project might be cool but I would be very uncomfortable running it like this, especially if that’s going to be my primary email, with all the password resetting capabilities etc.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 7
+score: 0
+lastActive: DateTime @1703756461 {#1613
date: 2023-12-28 10:41:01.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@Parachute4196@lemmy.world"
"@eskuero@lemmy.fromshado.ws"
"@ikidd@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#1687 …}
+nested: Doctrine\ORM\PersistentCollection {#1689 …}
+votes: Doctrine\ORM\PersistentCollection {#1691 …}
+reports: Doctrine\ORM\PersistentCollection {#1795 …}
+favourites: Doctrine\ORM\PersistentCollection {#1711 …}
+notifications: Doctrine\ORM\PersistentCollection {#1611 …}
-id: 258804
-bodyTs: "'add':64 'bad':12 'capabl':129 'check':61 'conflict':68 'contain':20,74,89 'cool':103 'cours':77 'crash':44 'cves':78 'defeat':23,70 'depend':65 'didn':59 'email':123 'especi':114 'etc':86,130 'general':9,91 'go':118 'guess':53 'handl':31 'idea':72 'imag':55 'init':38 'insid':18 'introduc':28 'isol':27 'like':49,112 'meant':93 'might':56,101 'multipl':16 'need':36,47 'password':127 'practic':13 'primari':122 'problem':29,83 'process':17,33 'project':100 'reset':128 'restart':40 'run':110 'softwar':63 'someth':48 'supervisord':50 'therefor':34 'think':4 'tool':41 'uncomfort':109 'use':57,96 'user':85 'usual':22 'way':98 'would':106 'yeah':88 'zombi':32"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/6274200"
+editedAt: null
+createdAt: DateTimeImmutable @1703756461 {#1604
date: 2023-12-28 10:41:01.0 +01:00
}
+"title": 258804
}
]
-id: 25264
-titleTs: "'stalwart':1 'v0.5.0':2"
-bodyTs: "'advanc':31 'announc':9 'approach':19 'design':60 'effici':39 'elev':1,62 'email':64 'end':21 'enhanc':53 'excit':7 'experi':66 'featur':59 'flexibl':4 'improv':56 'incorpor':48 'journey':34 'latest':46 'layer':55 'mail':14,42 'major':30 'mark':28 'new':58 'perform':2,52 'provid':36 'rang':50 'releas':11 'robust':38 'server':15,43,65 'signific':26 'solut':44 'stalwart':13 'storag':54 'updat':27 'v0.5.0':16 'versatil':41 'version':47 'year':24"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1703792857
+visibility: "visible "
+apId: "https://lemmy.world/post/10034802"
+editedAt: DateTimeImmutable @1708508842 {#2135
date: 2024-02-21 10:47:22.0 +01:00
}
+createdAt: DateTimeImmutable @1703706457 {#2096
date: 2023-12-27 20:47:37.0 +01:00
}
+__isInitialized__: true
…2
} |
|
Show voter details
|
23 |
DENIED
|
edit
|
Proxies\__CG__\App\Entity\Entry {#1619
+user: Proxies\__CG__\App\Entity\User {#2055 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1702 …}
+image: Proxies\__CG__\App\Entity\Image {#2107 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2110 …}
+slug: "Stalwart-v0-5-0"
+title: "Stalwart v0.5.0"
+url: "https://stalw.art/blog/storage-performance/"
+body: """
**Elevating Performance and Flexibility**\n
\n
We are excited to announce the release of Stalwart Mail Server v0.5.0. As we approach the end of the year, this significant update marks a major advancement in our journey to provide a robust, efficient, and versatile mail server solution. This latest version incorporates a range of performance enhancements, storage layer improvements, and new features, designed to elevate your email server experience.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 40
+favouriteCount: 119
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1720677469 {#2046
date: 2024-07-11 07:57:49.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2106 …}
+votes: Doctrine\ORM\PersistentCollection {#2117 …}
+reports: Doctrine\ORM\PersistentCollection {#2112 …}
+favourites: Doctrine\ORM\PersistentCollection {#2118 …}
+notifications: Doctrine\ORM\PersistentCollection {#2122 …}
+badges: Doctrine\ORM\PersistentCollection {#2113 …}
+children: [
App\Entity\EntryComment {#1596
+user: App\Entity\User {#261 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1619 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1702 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#1701 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#1683 …}
+body: """
I don’t think it’s you, it generally is a bad practice to have multiple processes inside a container. It usually defeats most of the isolation, introduces problems with handling zombie processes (therefore you need an init) and restarting tools when they crash (then you need something like supervisord, which I guess this image might use - I didn’t check). Each software adds dependencies, which can conflict (again defeating the idea of containers), and of course CVEs. Then you have a problem with users etc.\n
\n
So yeah, containers are generally not meant to be used this way. The project might be cool but I would be very uncomfortable running it like this, especially if that’s going to be my primary email, with all the password resetting capabilities etc.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 7
+score: 0
+lastActive: DateTime @1703756461 {#1613
date: 2023-12-28 10:41:01.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@Parachute4196@lemmy.world"
"@eskuero@lemmy.fromshado.ws"
"@ikidd@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#1687 …}
+nested: Doctrine\ORM\PersistentCollection {#1689 …}
+votes: Doctrine\ORM\PersistentCollection {#1691 …}
+reports: Doctrine\ORM\PersistentCollection {#1795 …}
+favourites: Doctrine\ORM\PersistentCollection {#1711 …}
+notifications: Doctrine\ORM\PersistentCollection {#1611 …}
-id: 258804
-bodyTs: "'add':64 'bad':12 'capabl':129 'check':61 'conflict':68 'contain':20,74,89 'cool':103 'cours':77 'crash':44 'cves':78 'defeat':23,70 'depend':65 'didn':59 'email':123 'especi':114 'etc':86,130 'general':9,91 'go':118 'guess':53 'handl':31 'idea':72 'imag':55 'init':38 'insid':18 'introduc':28 'isol':27 'like':49,112 'meant':93 'might':56,101 'multipl':16 'need':36,47 'password':127 'practic':13 'primari':122 'problem':29,83 'process':17,33 'project':100 'reset':128 'restart':40 'run':110 'softwar':63 'someth':48 'supervisord':50 'therefor':34 'think':4 'tool':41 'uncomfort':109 'use':57,96 'user':85 'usual':22 'way':98 'would':106 'yeah':88 'zombi':32"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/6274200"
+editedAt: null
+createdAt: DateTimeImmutable @1703756461 {#1604
date: 2023-12-28 10:41:01.0 +01:00
}
+"title": 258804
}
]
-id: 25264
-titleTs: "'stalwart':1 'v0.5.0':2"
-bodyTs: "'advanc':31 'announc':9 'approach':19 'design':60 'effici':39 'elev':1,62 'email':64 'end':21 'enhanc':53 'excit':7 'experi':66 'featur':59 'flexibl':4 'improv':56 'incorpor':48 'journey':34 'latest':46 'layer':55 'mail':14,42 'major':30 'mark':28 'new':58 'perform':2,52 'provid':36 'rang':50 'releas':11 'robust':38 'server':15,43,65 'signific':26 'solut':44 'stalwart':13 'storag':54 'updat':27 'v0.5.0':16 'versatil':41 'version':47 'year':24"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1703792857
+visibility: "visible "
+apId: "https://lemmy.world/post/10034802"
+editedAt: DateTimeImmutable @1708508842 {#2135
date: 2024-02-21 10:47:22.0 +01:00
}
+createdAt: DateTimeImmutable @1703706457 {#2096
date: 2023-12-27 20:47:37.0 +01:00
}
+__isInitialized__: true
…2
} |
|
Show voter details
|
24 |
DENIED
|
moderate
|
Proxies\__CG__\App\Entity\Entry {#1619
+user: Proxies\__CG__\App\Entity\User {#2055 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1702 …}
+image: Proxies\__CG__\App\Entity\Image {#2107 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2110 …}
+slug: "Stalwart-v0-5-0"
+title: "Stalwart v0.5.0"
+url: "https://stalw.art/blog/storage-performance/"
+body: """
**Elevating Performance and Flexibility**\n
\n
We are excited to announce the release of Stalwart Mail Server v0.5.0. As we approach the end of the year, this significant update marks a major advancement in our journey to provide a robust, efficient, and versatile mail server solution. This latest version incorporates a range of performance enhancements, storage layer improvements, and new features, designed to elevate your email server experience.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 40
+favouriteCount: 119
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1720677469 {#2046
date: 2024-07-11 07:57:49.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2106 …}
+votes: Doctrine\ORM\PersistentCollection {#2117 …}
+reports: Doctrine\ORM\PersistentCollection {#2112 …}
+favourites: Doctrine\ORM\PersistentCollection {#2118 …}
+notifications: Doctrine\ORM\PersistentCollection {#2122 …}
+badges: Doctrine\ORM\PersistentCollection {#2113 …}
+children: [
App\Entity\EntryComment {#1596
+user: App\Entity\User {#261 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1619 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1702 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#1701 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#1683 …}
+body: """
I don’t think it’s you, it generally is a bad practice to have multiple processes inside a container. It usually defeats most of the isolation, introduces problems with handling zombie processes (therefore you need an init) and restarting tools when they crash (then you need something like supervisord, which I guess this image might use - I didn’t check). Each software adds dependencies, which can conflict (again defeating the idea of containers), and of course CVEs. Then you have a problem with users etc.\n
\n
So yeah, containers are generally not meant to be used this way. The project might be cool but I would be very uncomfortable running it like this, especially if that’s going to be my primary email, with all the password resetting capabilities etc.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 7
+score: 0
+lastActive: DateTime @1703756461 {#1613
date: 2023-12-28 10:41:01.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@Parachute4196@lemmy.world"
"@eskuero@lemmy.fromshado.ws"
"@ikidd@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#1687 …}
+nested: Doctrine\ORM\PersistentCollection {#1689 …}
+votes: Doctrine\ORM\PersistentCollection {#1691 …}
+reports: Doctrine\ORM\PersistentCollection {#1795 …}
+favourites: Doctrine\ORM\PersistentCollection {#1711 …}
+notifications: Doctrine\ORM\PersistentCollection {#1611 …}
-id: 258804
-bodyTs: "'add':64 'bad':12 'capabl':129 'check':61 'conflict':68 'contain':20,74,89 'cool':103 'cours':77 'crash':44 'cves':78 'defeat':23,70 'depend':65 'didn':59 'email':123 'especi':114 'etc':86,130 'general':9,91 'go':118 'guess':53 'handl':31 'idea':72 'imag':55 'init':38 'insid':18 'introduc':28 'isol':27 'like':49,112 'meant':93 'might':56,101 'multipl':16 'need':36,47 'password':127 'practic':13 'primari':122 'problem':29,83 'process':17,33 'project':100 'reset':128 'restart':40 'run':110 'softwar':63 'someth':48 'supervisord':50 'therefor':34 'think':4 'tool':41 'uncomfort':109 'use':57,96 'user':85 'usual':22 'way':98 'would':106 'yeah':88 'zombi':32"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/6274200"
+editedAt: null
+createdAt: DateTimeImmutable @1703756461 {#1604
date: 2023-12-28 10:41:01.0 +01:00
}
+"title": 258804
}
]
-id: 25264
-titleTs: "'stalwart':1 'v0.5.0':2"
-bodyTs: "'advanc':31 'announc':9 'approach':19 'design':60 'effici':39 'elev':1,62 'email':64 'end':21 'enhanc':53 'excit':7 'experi':66 'featur':59 'flexibl':4 'improv':56 'incorpor':48 'journey':34 'latest':46 'layer':55 'mail':14,42 'major':30 'mark':28 'new':58 'perform':2,52 'provid':36 'rang':50 'releas':11 'robust':38 'server':15,43,65 'signific':26 'solut':44 'stalwart':13 'storag':54 'updat':27 'v0.5.0':16 'versatil':41 'version':47 'year':24"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1703792857
+visibility: "visible "
+apId: "https://lemmy.world/post/10034802"
+editedAt: DateTimeImmutable @1708508842 {#2135
date: 2024-02-21 10:47:22.0 +01:00
}
+createdAt: DateTimeImmutable @1703706457 {#2096
date: 2023-12-27 20:47:37.0 +01:00
}
+__isInitialized__: true
…2
} |
|
Show voter details
|
25 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
26 |
DENIED
|
moderate
|
App\Entity\EntryComment {#1596
+user: App\Entity\User {#261 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1619
+user: Proxies\__CG__\App\Entity\User {#2055 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1702 …}
+image: Proxies\__CG__\App\Entity\Image {#2107 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2110 …}
+slug: "Stalwart-v0-5-0"
+title: "Stalwart v0.5.0"
+url: "https://stalw.art/blog/storage-performance/"
+body: """
**Elevating Performance and Flexibility**\n
\n
We are excited to announce the release of Stalwart Mail Server v0.5.0. As we approach the end of the year, this significant update marks a major advancement in our journey to provide a robust, efficient, and versatile mail server solution. This latest version incorporates a range of performance enhancements, storage layer improvements, and new features, designed to elevate your email server experience.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 40
+favouriteCount: 119
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1720677469 {#2046
date: 2024-07-11 07:57:49.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2106 …}
+votes: Doctrine\ORM\PersistentCollection {#2117 …}
+reports: Doctrine\ORM\PersistentCollection {#2112 …}
+favourites: Doctrine\ORM\PersistentCollection {#2118 …}
+notifications: Doctrine\ORM\PersistentCollection {#2122 …}
+badges: Doctrine\ORM\PersistentCollection {#2113 …}
+children: [
App\Entity\EntryComment {#1596}
]
-id: 25264
-titleTs: "'stalwart':1 'v0.5.0':2"
-bodyTs: "'advanc':31 'announc':9 'approach':19 'design':60 'effici':39 'elev':1,62 'email':64 'end':21 'enhanc':53 'excit':7 'experi':66 'featur':59 'flexibl':4 'improv':56 'incorpor':48 'journey':34 'latest':46 'layer':55 'mail':14,42 'major':30 'mark':28 'new':58 'perform':2,52 'provid':36 'rang':50 'releas':11 'robust':38 'server':15,43,65 'signific':26 'solut':44 'stalwart':13 'storag':54 'updat':27 'v0.5.0':16 'versatil':41 'version':47 'year':24"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1703792857
+visibility: "visible "
+apId: "https://lemmy.world/post/10034802"
+editedAt: DateTimeImmutable @1708508842 {#2135
date: 2024-02-21 10:47:22.0 +01:00
}
+createdAt: DateTimeImmutable @1703706457 {#2096
date: 2023-12-27 20:47:37.0 +01:00
}
+__isInitialized__: true
…2
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1702 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#1701 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#1683 …}
+body: """
I don’t think it’s you, it generally is a bad practice to have multiple processes inside a container. It usually defeats most of the isolation, introduces problems with handling zombie processes (therefore you need an init) and restarting tools when they crash (then you need something like supervisord, which I guess this image might use - I didn’t check). Each software adds dependencies, which can conflict (again defeating the idea of containers), and of course CVEs. Then you have a problem with users etc.\n
\n
So yeah, containers are generally not meant to be used this way. The project might be cool but I would be very uncomfortable running it like this, especially if that’s going to be my primary email, with all the password resetting capabilities etc.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 7
+score: 0
+lastActive: DateTime @1703756461 {#1613
date: 2023-12-28 10:41:01.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@Parachute4196@lemmy.world"
"@eskuero@lemmy.fromshado.ws"
"@ikidd@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#1687 …}
+nested: Doctrine\ORM\PersistentCollection {#1689 …}
+votes: Doctrine\ORM\PersistentCollection {#1691 …}
+reports: Doctrine\ORM\PersistentCollection {#1795 …}
+favourites: Doctrine\ORM\PersistentCollection {#1711 …}
+notifications: Doctrine\ORM\PersistentCollection {#1611 …}
-id: 258804
-bodyTs: "'add':64 'bad':12 'capabl':129 'check':61 'conflict':68 'contain':20,74,89 'cool':103 'cours':77 'crash':44 'cves':78 'defeat':23,70 'depend':65 'didn':59 'email':123 'especi':114 'etc':86,130 'general':9,91 'go':118 'guess':53 'handl':31 'idea':72 'imag':55 'init':38 'insid':18 'introduc':28 'isol':27 'like':49,112 'meant':93 'might':56,101 'multipl':16 'need':36,47 'password':127 'practic':13 'primari':122 'problem':29,83 'process':17,33 'project':100 'reset':128 'restart':40 'run':110 'softwar':63 'someth':48 'supervisord':50 'therefor':34 'think':4 'tool':41 'uncomfort':109 'use':57,96 'user':85 'usual':22 'way':98 'would':106 'yeah':88 'zombi':32"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/6274200"
+editedAt: null
+createdAt: DateTimeImmutable @1703756461 {#1604
date: 2023-12-28 10:41:01.0 +01:00
}
+"title": 258804
} |
|
Show voter details
|
27 |
DENIED
|
edit
|
App\Entity\EntryComment {#1596
+user: App\Entity\User {#261 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1619
+user: Proxies\__CG__\App\Entity\User {#2055 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1702 …}
+image: Proxies\__CG__\App\Entity\Image {#2107 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2110 …}
+slug: "Stalwart-v0-5-0"
+title: "Stalwart v0.5.0"
+url: "https://stalw.art/blog/storage-performance/"
+body: """
**Elevating Performance and Flexibility**\n
\n
We are excited to announce the release of Stalwart Mail Server v0.5.0. As we approach the end of the year, this significant update marks a major advancement in our journey to provide a robust, efficient, and versatile mail server solution. This latest version incorporates a range of performance enhancements, storage layer improvements, and new features, designed to elevate your email server experience.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 40
+favouriteCount: 119
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1720677469 {#2046
date: 2024-07-11 07:57:49.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2106 …}
+votes: Doctrine\ORM\PersistentCollection {#2117 …}
+reports: Doctrine\ORM\PersistentCollection {#2112 …}
+favourites: Doctrine\ORM\PersistentCollection {#2118 …}
+notifications: Doctrine\ORM\PersistentCollection {#2122 …}
+badges: Doctrine\ORM\PersistentCollection {#2113 …}
+children: [
App\Entity\EntryComment {#1596}
]
-id: 25264
-titleTs: "'stalwart':1 'v0.5.0':2"
-bodyTs: "'advanc':31 'announc':9 'approach':19 'design':60 'effici':39 'elev':1,62 'email':64 'end':21 'enhanc':53 'excit':7 'experi':66 'featur':59 'flexibl':4 'improv':56 'incorpor':48 'journey':34 'latest':46 'layer':55 'mail':14,42 'major':30 'mark':28 'new':58 'perform':2,52 'provid':36 'rang':50 'releas':11 'robust':38 'server':15,43,65 'signific':26 'solut':44 'stalwart':13 'storag':54 'updat':27 'v0.5.0':16 'versatil':41 'version':47 'year':24"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1703792857
+visibility: "visible "
+apId: "https://lemmy.world/post/10034802"
+editedAt: DateTimeImmutable @1708508842 {#2135
date: 2024-02-21 10:47:22.0 +01:00
}
+createdAt: DateTimeImmutable @1703706457 {#2096
date: 2023-12-27 20:47:37.0 +01:00
}
+__isInitialized__: true
…2
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1702 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#1701 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#1683 …}
+body: """
I don’t think it’s you, it generally is a bad practice to have multiple processes inside a container. It usually defeats most of the isolation, introduces problems with handling zombie processes (therefore you need an init) and restarting tools when they crash (then you need something like supervisord, which I guess this image might use - I didn’t check). Each software adds dependencies, which can conflict (again defeating the idea of containers), and of course CVEs. Then you have a problem with users etc.\n
\n
So yeah, containers are generally not meant to be used this way. The project might be cool but I would be very uncomfortable running it like this, especially if that’s going to be my primary email, with all the password resetting capabilities etc.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 7
+score: 0
+lastActive: DateTime @1703756461 {#1613
date: 2023-12-28 10:41:01.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@Parachute4196@lemmy.world"
"@eskuero@lemmy.fromshado.ws"
"@ikidd@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#1687 …}
+nested: Doctrine\ORM\PersistentCollection {#1689 …}
+votes: Doctrine\ORM\PersistentCollection {#1691 …}
+reports: Doctrine\ORM\PersistentCollection {#1795 …}
+favourites: Doctrine\ORM\PersistentCollection {#1711 …}
+notifications: Doctrine\ORM\PersistentCollection {#1611 …}
-id: 258804
-bodyTs: "'add':64 'bad':12 'capabl':129 'check':61 'conflict':68 'contain':20,74,89 'cool':103 'cours':77 'crash':44 'cves':78 'defeat':23,70 'depend':65 'didn':59 'email':123 'especi':114 'etc':86,130 'general':9,91 'go':118 'guess':53 'handl':31 'idea':72 'imag':55 'init':38 'insid':18 'introduc':28 'isol':27 'like':49,112 'meant':93 'might':56,101 'multipl':16 'need':36,47 'password':127 'practic':13 'primari':122 'problem':29,83 'process':17,33 'project':100 'reset':128 'restart':40 'run':110 'softwar':63 'someth':48 'supervisord':50 'therefor':34 'think':4 'tool':41 'uncomfort':109 'use':57,96 'user':85 'usual':22 'way':98 'would':106 'yeah':88 'zombi':32"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/6274200"
+editedAt: null
+createdAt: DateTimeImmutable @1703756461 {#1604
date: 2023-12-28 10:41:01.0 +01:00
}
+"title": 258804
} |
|
Show voter details
|
28 |
DENIED
|
moderate
|
App\Entity\EntryComment {#1596
+user: App\Entity\User {#261 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1619
+user: Proxies\__CG__\App\Entity\User {#2055 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1702 …}
+image: Proxies\__CG__\App\Entity\Image {#2107 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2110 …}
+slug: "Stalwart-v0-5-0"
+title: "Stalwart v0.5.0"
+url: "https://stalw.art/blog/storage-performance/"
+body: """
**Elevating Performance and Flexibility**\n
\n
We are excited to announce the release of Stalwart Mail Server v0.5.0. As we approach the end of the year, this significant update marks a major advancement in our journey to provide a robust, efficient, and versatile mail server solution. This latest version incorporates a range of performance enhancements, storage layer improvements, and new features, designed to elevate your email server experience.
"""
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 40
+favouriteCount: 119
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1720677469 {#2046
date: 2024-07-11 07:57:49.0 +02:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2106 …}
+votes: Doctrine\ORM\PersistentCollection {#2117 …}
+reports: Doctrine\ORM\PersistentCollection {#2112 …}
+favourites: Doctrine\ORM\PersistentCollection {#2118 …}
+notifications: Doctrine\ORM\PersistentCollection {#2122 …}
+badges: Doctrine\ORM\PersistentCollection {#2113 …}
+children: [
App\Entity\EntryComment {#1596}
]
-id: 25264
-titleTs: "'stalwart':1 'v0.5.0':2"
-bodyTs: "'advanc':31 'announc':9 'approach':19 'design':60 'effici':39 'elev':1,62 'email':64 'end':21 'enhanc':53 'excit':7 'experi':66 'featur':59 'flexibl':4 'improv':56 'incorpor':48 'journey':34 'latest':46 'layer':55 'mail':14,42 'major':30 'mark':28 'new':58 'perform':2,52 'provid':36 'rang':50 'releas':11 'robust':38 'server':15,43,65 'signific':26 'solut':44 'stalwart':13 'storag':54 'updat':27 'v0.5.0':16 'versatil':41 'version':47 'year':24"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1703792857
+visibility: "visible "
+apId: "https://lemmy.world/post/10034802"
+editedAt: DateTimeImmutable @1708508842 {#2135
date: 2024-02-21 10:47:22.0 +01:00
}
+createdAt: DateTimeImmutable @1703706457 {#2096
date: 2023-12-27 20:47:37.0 +01:00
}
+__isInitialized__: true
…2
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1702 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#1701 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#1683 …}
+body: """
I don’t think it’s you, it generally is a bad practice to have multiple processes inside a container. It usually defeats most of the isolation, introduces problems with handling zombie processes (therefore you need an init) and restarting tools when they crash (then you need something like supervisord, which I guess this image might use - I didn’t check). Each software adds dependencies, which can conflict (again defeating the idea of containers), and of course CVEs. Then you have a problem with users etc.\n
\n
So yeah, containers are generally not meant to be used this way. The project might be cool but I would be very uncomfortable running it like this, especially if that’s going to be my primary email, with all the password resetting capabilities etc.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 7
+score: 0
+lastActive: DateTime @1703756461 {#1613
date: 2023-12-28 10:41:01.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@Parachute4196@lemmy.world"
"@eskuero@lemmy.fromshado.ws"
"@ikidd@lemmy.world"
]
+children: Doctrine\ORM\PersistentCollection {#1687 …}
+nested: Doctrine\ORM\PersistentCollection {#1689 …}
+votes: Doctrine\ORM\PersistentCollection {#1691 …}
+reports: Doctrine\ORM\PersistentCollection {#1795 …}
+favourites: Doctrine\ORM\PersistentCollection {#1711 …}
+notifications: Doctrine\ORM\PersistentCollection {#1611 …}
-id: 258804
-bodyTs: "'add':64 'bad':12 'capabl':129 'check':61 'conflict':68 'contain':20,74,89 'cool':103 'cours':77 'crash':44 'cves':78 'defeat':23,70 'depend':65 'didn':59 'email':123 'especi':114 'etc':86,130 'general':9,91 'go':118 'guess':53 'handl':31 'idea':72 'imag':55 'init':38 'insid':18 'introduc':28 'isol':27 'like':49,112 'meant':93 'might':56,101 'multipl':16 'need':36,47 'password':127 'practic':13 'primari':122 'problem':29,83 'process':17,33 'project':100 'reset':128 'restart':40 'run':110 'softwar':63 'someth':48 'supervisord':50 'therefor':34 'think':4 'tool':41 'uncomfort':109 'use':57,96 'user':85 'usual':22 'way':98 'would':106 'yeah':88 'zombi':32"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/6274200"
+editedAt: null
+createdAt: DateTimeImmutable @1703756461 {#1604
date: 2023-12-28 10:41:01.0 +01:00
}
+"title": 258804
} |
|
Show voter details
|
29 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
30 |
DENIED
|
moderate
|
Proxies\__CG__\App\Entity\Entry {#1559
+user: Proxies\__CG__\App\Entity\User {#2073 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1525 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2163 …}
+slug: "Proton-Drive-Camera-Backup-has-Arrived"
+title: "Proton Drive Camera Backup has Arrived!"
+url: "https://proton.me/support/enable-photo-backup"
+body: "This has been one of the key features I’ve been waiting for to finally be able to move away from Google Photos and OneDrive for mobile photos backup."
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 9
+favouriteCount: 107
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1702185373 {#2119
date: 2023-12-10 06:16:13.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2044 …}
+votes: Doctrine\ORM\PersistentCollection {#2127 …}
+reports: Doctrine\ORM\PersistentCollection {#2043 …}
+favourites: Doctrine\ORM\PersistentCollection {#2215 …}
+notifications: Doctrine\ORM\PersistentCollection {#2198 …}
+badges: Doctrine\ORM\PersistentCollection {#2227 …}
+children: [
App\Entity\EntryComment {#1564
+user: App\Entity\User {#261 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1559 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1525 …}
+image: null
+parent: null
+root: null
+body: "Thanks for sharing, I was not aware of it, and it worked like a charm."
+lang: "en"
+isAdult: false
+favouriteCount: 3
+score: 0
+lastActive: DateTime @1702054271 {#1584
date: 2023-12-08 17:51:11.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@OminousOrange@lemmy.ca"
]
+children: Doctrine\ORM\PersistentCollection {#1567 …}
+nested: Doctrine\ORM\PersistentCollection {#1563 …}
+votes: Doctrine\ORM\PersistentCollection {#1565 …}
+reports: Doctrine\ORM\PersistentCollection {#1558 …}
+favourites: Doctrine\ORM\PersistentCollection {#1557 …}
+notifications: Doctrine\ORM\PersistentCollection {#1621 …}
-id: 211123
-bodyTs: "'awar':7 'charm':15 'like':13 'share':3 'thank':1 'work':12"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/5899794"
+editedAt: null
+createdAt: DateTimeImmutable @1702054271 {#1548
date: 2023-12-08 17:51:11.0 +01:00
}
+"title": 211123
}
]
-id: 21188
-titleTs: "'arriv':6 'backup':4 'camera':3 'drive':2 'proton':1"
-bodyTs: "'abl':17 'away':20 'backup':29 'featur':8 'final':15 'googl':22 'key':7 'mobil':27 'move':19 'one':4 'onedr':25 'photo':23,28 've':10 'wait':12"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1702132508
+visibility: "visible "
+apId: "https://lemmy.ca/post/10899393"
+editedAt: null
+createdAt: DateTimeImmutable @1702046108 {#2052
date: 2023-12-08 15:35:08.0 +01:00
}
+__isInitialized__: true
…2
} |
|
Show voter details
|
31 |
DENIED
|
edit
|
Proxies\__CG__\App\Entity\Entry {#1559
+user: Proxies\__CG__\App\Entity\User {#2073 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1525 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2163 …}
+slug: "Proton-Drive-Camera-Backup-has-Arrived"
+title: "Proton Drive Camera Backup has Arrived!"
+url: "https://proton.me/support/enable-photo-backup"
+body: "This has been one of the key features I’ve been waiting for to finally be able to move away from Google Photos and OneDrive for mobile photos backup."
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 9
+favouriteCount: 107
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1702185373 {#2119
date: 2023-12-10 06:16:13.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2044 …}
+votes: Doctrine\ORM\PersistentCollection {#2127 …}
+reports: Doctrine\ORM\PersistentCollection {#2043 …}
+favourites: Doctrine\ORM\PersistentCollection {#2215 …}
+notifications: Doctrine\ORM\PersistentCollection {#2198 …}
+badges: Doctrine\ORM\PersistentCollection {#2227 …}
+children: [
App\Entity\EntryComment {#1564
+user: App\Entity\User {#261 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1559 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1525 …}
+image: null
+parent: null
+root: null
+body: "Thanks for sharing, I was not aware of it, and it worked like a charm."
+lang: "en"
+isAdult: false
+favouriteCount: 3
+score: 0
+lastActive: DateTime @1702054271 {#1584
date: 2023-12-08 17:51:11.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@OminousOrange@lemmy.ca"
]
+children: Doctrine\ORM\PersistentCollection {#1567 …}
+nested: Doctrine\ORM\PersistentCollection {#1563 …}
+votes: Doctrine\ORM\PersistentCollection {#1565 …}
+reports: Doctrine\ORM\PersistentCollection {#1558 …}
+favourites: Doctrine\ORM\PersistentCollection {#1557 …}
+notifications: Doctrine\ORM\PersistentCollection {#1621 …}
-id: 211123
-bodyTs: "'awar':7 'charm':15 'like':13 'share':3 'thank':1 'work':12"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/5899794"
+editedAt: null
+createdAt: DateTimeImmutable @1702054271 {#1548
date: 2023-12-08 17:51:11.0 +01:00
}
+"title": 211123
}
]
-id: 21188
-titleTs: "'arriv':6 'backup':4 'camera':3 'drive':2 'proton':1"
-bodyTs: "'abl':17 'away':20 'backup':29 'featur':8 'final':15 'googl':22 'key':7 'mobil':27 'move':19 'one':4 'onedr':25 'photo':23,28 've':10 'wait':12"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1702132508
+visibility: "visible "
+apId: "https://lemmy.ca/post/10899393"
+editedAt: null
+createdAt: DateTimeImmutable @1702046108 {#2052
date: 2023-12-08 15:35:08.0 +01:00
}
+__isInitialized__: true
…2
} |
|
Show voter details
|
32 |
DENIED
|
moderate
|
Proxies\__CG__\App\Entity\Entry {#1559
+user: Proxies\__CG__\App\Entity\User {#2073 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1525 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2163 …}
+slug: "Proton-Drive-Camera-Backup-has-Arrived"
+title: "Proton Drive Camera Backup has Arrived!"
+url: "https://proton.me/support/enable-photo-backup"
+body: "This has been one of the key features I’ve been waiting for to finally be able to move away from Google Photos and OneDrive for mobile photos backup."
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 9
+favouriteCount: 107
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1702185373 {#2119
date: 2023-12-10 06:16:13.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2044 …}
+votes: Doctrine\ORM\PersistentCollection {#2127 …}
+reports: Doctrine\ORM\PersistentCollection {#2043 …}
+favourites: Doctrine\ORM\PersistentCollection {#2215 …}
+notifications: Doctrine\ORM\PersistentCollection {#2198 …}
+badges: Doctrine\ORM\PersistentCollection {#2227 …}
+children: [
App\Entity\EntryComment {#1564
+user: App\Entity\User {#261 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1559 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1525 …}
+image: null
+parent: null
+root: null
+body: "Thanks for sharing, I was not aware of it, and it worked like a charm."
+lang: "en"
+isAdult: false
+favouriteCount: 3
+score: 0
+lastActive: DateTime @1702054271 {#1584
date: 2023-12-08 17:51:11.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@OminousOrange@lemmy.ca"
]
+children: Doctrine\ORM\PersistentCollection {#1567 …}
+nested: Doctrine\ORM\PersistentCollection {#1563 …}
+votes: Doctrine\ORM\PersistentCollection {#1565 …}
+reports: Doctrine\ORM\PersistentCollection {#1558 …}
+favourites: Doctrine\ORM\PersistentCollection {#1557 …}
+notifications: Doctrine\ORM\PersistentCollection {#1621 …}
-id: 211123
-bodyTs: "'awar':7 'charm':15 'like':13 'share':3 'thank':1 'work':12"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/5899794"
+editedAt: null
+createdAt: DateTimeImmutable @1702054271 {#1548
date: 2023-12-08 17:51:11.0 +01:00
}
+"title": 211123
}
]
-id: 21188
-titleTs: "'arriv':6 'backup':4 'camera':3 'drive':2 'proton':1"
-bodyTs: "'abl':17 'away':20 'backup':29 'featur':8 'final':15 'googl':22 'key':7 'mobil':27 'move':19 'one':4 'onedr':25 'photo':23,28 've':10 'wait':12"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1702132508
+visibility: "visible "
+apId: "https://lemmy.ca/post/10899393"
+editedAt: null
+createdAt: DateTimeImmutable @1702046108 {#2052
date: 2023-12-08 15:35:08.0 +01:00
}
+__isInitialized__: true
…2
} |
|
Show voter details
|
33 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
34 |
DENIED
|
moderate
|
App\Entity\EntryComment {#1564
+user: App\Entity\User {#261 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1559
+user: Proxies\__CG__\App\Entity\User {#2073 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1525 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2163 …}
+slug: "Proton-Drive-Camera-Backup-has-Arrived"
+title: "Proton Drive Camera Backup has Arrived!"
+url: "https://proton.me/support/enable-photo-backup"
+body: "This has been one of the key features I’ve been waiting for to finally be able to move away from Google Photos and OneDrive for mobile photos backup."
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 9
+favouriteCount: 107
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1702185373 {#2119
date: 2023-12-10 06:16:13.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2044 …}
+votes: Doctrine\ORM\PersistentCollection {#2127 …}
+reports: Doctrine\ORM\PersistentCollection {#2043 …}
+favourites: Doctrine\ORM\PersistentCollection {#2215 …}
+notifications: Doctrine\ORM\PersistentCollection {#2198 …}
+badges: Doctrine\ORM\PersistentCollection {#2227 …}
+children: [
App\Entity\EntryComment {#1564}
]
-id: 21188
-titleTs: "'arriv':6 'backup':4 'camera':3 'drive':2 'proton':1"
-bodyTs: "'abl':17 'away':20 'backup':29 'featur':8 'final':15 'googl':22 'key':7 'mobil':27 'move':19 'one':4 'onedr':25 'photo':23,28 've':10 'wait':12"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1702132508
+visibility: "visible "
+apId: "https://lemmy.ca/post/10899393"
+editedAt: null
+createdAt: DateTimeImmutable @1702046108 {#2052
date: 2023-12-08 15:35:08.0 +01:00
}
+__isInitialized__: true
…2
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1525 …}
+image: null
+parent: null
+root: null
+body: "Thanks for sharing, I was not aware of it, and it worked like a charm."
+lang: "en"
+isAdult: false
+favouriteCount: 3
+score: 0
+lastActive: DateTime @1702054271 {#1584
date: 2023-12-08 17:51:11.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@OminousOrange@lemmy.ca"
]
+children: Doctrine\ORM\PersistentCollection {#1567 …}
+nested: Doctrine\ORM\PersistentCollection {#1563 …}
+votes: Doctrine\ORM\PersistentCollection {#1565 …}
+reports: Doctrine\ORM\PersistentCollection {#1558 …}
+favourites: Doctrine\ORM\PersistentCollection {#1557 …}
+notifications: Doctrine\ORM\PersistentCollection {#1621 …}
-id: 211123
-bodyTs: "'awar':7 'charm':15 'like':13 'share':3 'thank':1 'work':12"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/5899794"
+editedAt: null
+createdAt: DateTimeImmutable @1702054271 {#1548
date: 2023-12-08 17:51:11.0 +01:00
}
+"title": 211123
} |
|
Show voter details
|
35 |
DENIED
|
edit
|
App\Entity\EntryComment {#1564
+user: App\Entity\User {#261 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1559
+user: Proxies\__CG__\App\Entity\User {#2073 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1525 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2163 …}
+slug: "Proton-Drive-Camera-Backup-has-Arrived"
+title: "Proton Drive Camera Backup has Arrived!"
+url: "https://proton.me/support/enable-photo-backup"
+body: "This has been one of the key features I’ve been waiting for to finally be able to move away from Google Photos and OneDrive for mobile photos backup."
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 9
+favouriteCount: 107
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1702185373 {#2119
date: 2023-12-10 06:16:13.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2044 …}
+votes: Doctrine\ORM\PersistentCollection {#2127 …}
+reports: Doctrine\ORM\PersistentCollection {#2043 …}
+favourites: Doctrine\ORM\PersistentCollection {#2215 …}
+notifications: Doctrine\ORM\PersistentCollection {#2198 …}
+badges: Doctrine\ORM\PersistentCollection {#2227 …}
+children: [
App\Entity\EntryComment {#1564}
]
-id: 21188
-titleTs: "'arriv':6 'backup':4 'camera':3 'drive':2 'proton':1"
-bodyTs: "'abl':17 'away':20 'backup':29 'featur':8 'final':15 'googl':22 'key':7 'mobil':27 'move':19 'one':4 'onedr':25 'photo':23,28 've':10 'wait':12"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1702132508
+visibility: "visible "
+apId: "https://lemmy.ca/post/10899393"
+editedAt: null
+createdAt: DateTimeImmutable @1702046108 {#2052
date: 2023-12-08 15:35:08.0 +01:00
}
+__isInitialized__: true
…2
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1525 …}
+image: null
+parent: null
+root: null
+body: "Thanks for sharing, I was not aware of it, and it worked like a charm."
+lang: "en"
+isAdult: false
+favouriteCount: 3
+score: 0
+lastActive: DateTime @1702054271 {#1584
date: 2023-12-08 17:51:11.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@OminousOrange@lemmy.ca"
]
+children: Doctrine\ORM\PersistentCollection {#1567 …}
+nested: Doctrine\ORM\PersistentCollection {#1563 …}
+votes: Doctrine\ORM\PersistentCollection {#1565 …}
+reports: Doctrine\ORM\PersistentCollection {#1558 …}
+favourites: Doctrine\ORM\PersistentCollection {#1557 …}
+notifications: Doctrine\ORM\PersistentCollection {#1621 …}
-id: 211123
-bodyTs: "'awar':7 'charm':15 'like':13 'share':3 'thank':1 'work':12"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/5899794"
+editedAt: null
+createdAt: DateTimeImmutable @1702054271 {#1548
date: 2023-12-08 17:51:11.0 +01:00
}
+"title": 211123
} |
|
Show voter details
|
36 |
DENIED
|
moderate
|
App\Entity\EntryComment {#1564
+user: App\Entity\User {#261 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1559
+user: Proxies\__CG__\App\Entity\User {#2073 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1525 …}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2163 …}
+slug: "Proton-Drive-Camera-Backup-has-Arrived"
+title: "Proton Drive Camera Backup has Arrived!"
+url: "https://proton.me/support/enable-photo-backup"
+body: "This has been one of the key features I’ve been waiting for to finally be able to move away from Google Photos and OneDrive for mobile photos backup."
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 9
+favouriteCount: 107
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1702185373 {#2119
date: 2023-12-10 06:16:13.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2044 …}
+votes: Doctrine\ORM\PersistentCollection {#2127 …}
+reports: Doctrine\ORM\PersistentCollection {#2043 …}
+favourites: Doctrine\ORM\PersistentCollection {#2215 …}
+notifications: Doctrine\ORM\PersistentCollection {#2198 …}
+badges: Doctrine\ORM\PersistentCollection {#2227 …}
+children: [
App\Entity\EntryComment {#1564}
]
-id: 21188
-titleTs: "'arriv':6 'backup':4 'camera':3 'drive':2 'proton':1"
-bodyTs: "'abl':17 'away':20 'backup':29 'featur':8 'final':15 'googl':22 'key':7 'mobil':27 'move':19 'one':4 'onedr':25 'photo':23,28 've':10 'wait':12"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1702132508
+visibility: "visible "
+apId: "https://lemmy.ca/post/10899393"
+editedAt: null
+createdAt: DateTimeImmutable @1702046108 {#2052
date: 2023-12-08 15:35:08.0 +01:00
}
+__isInitialized__: true
…2
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1525 …}
+image: null
+parent: null
+root: null
+body: "Thanks for sharing, I was not aware of it, and it worked like a charm."
+lang: "en"
+isAdult: false
+favouriteCount: 3
+score: 0
+lastActive: DateTime @1702054271 {#1584
date: 2023-12-08 17:51:11.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@OminousOrange@lemmy.ca"
]
+children: Doctrine\ORM\PersistentCollection {#1567 …}
+nested: Doctrine\ORM\PersistentCollection {#1563 …}
+votes: Doctrine\ORM\PersistentCollection {#1565 …}
+reports: Doctrine\ORM\PersistentCollection {#1558 …}
+favourites: Doctrine\ORM\PersistentCollection {#1557 …}
+notifications: Doctrine\ORM\PersistentCollection {#1621 …}
-id: 211123
-bodyTs: "'awar':7 'charm':15 'like':13 'share':3 'thank':1 'work':12"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/5899794"
+editedAt: null
+createdAt: DateTimeImmutable @1702054271 {#1548
date: 2023-12-08 17:51:11.0 +01:00
}
+"title": 211123
} |
|
Show voter details
|
37 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
38 |
DENIED
|
moderate
|
Proxies\__CG__\App\Entity\Entry {#1578
+user: Proxies\__CG__\App\Entity\User {#2057 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: Proxies\__CG__\App\Entity\Image {#2232 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2228 …}
+slug: "7-Ways-to-Tweak-Sudo-Command-in-Linux"
+title: "7 Ways to Tweak Sudo Command in Linux"
+url: "https://itsfoss.com/sudo-tips/"
+body: null
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 20
+favouriteCount: 61
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1701904582 {#2214
date: 2023-12-07 00:16:22.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2252 …}
+votes: Doctrine\ORM\PersistentCollection {#2189 …}
+reports: Doctrine\ORM\PersistentCollection {#2311 …}
+favourites: Doctrine\ORM\PersistentCollection {#2293 …}
+notifications: Doctrine\ORM\PersistentCollection {#2309 …}
+badges: Doctrine\ORM\PersistentCollection {#2302 …}
+children: [
App\Entity\EntryComment {#1595
+user: App\Entity\User {#261 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1578 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#1652 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#1654 …}
+body: """
If you containerize, the application (malware) will run under the user configured in the image, unless you override it, and in a separate mount namespace, unless you change that, which makes the “alias sudo” trick extremely unlikely.\n
\n
Even running under a separate user anyway prevents almost fully the attack you mention, unless the separate user has root privileges or the DAC_OVERRIDE capability is assigned to the binary (assigning it requires CAP_SYS_ADMIN).\n
\n
In short, the attack you mention is a common persistence and privilege escalation vector, which is relatively easy to detect (watch for changes to shell profiles), although preventing it requires some care. I just want to point out that in single-user machines (e.g. personal computers) escalating to root is anyway fairly unnecessary, given that all the juicy stuff (ssh keys, data, etc.) is anyway probably running under/owned by that user.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1701900436 {#1430
date: 2023-12-06 23:07:16.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@petsoi@discuss.tchncs.de"
"@Pantherina@feddit.de"
"@digdilem@lemmy.ml"
"@IAm_A_Complete_Idiot@sh.itjust.works"
]
+children: Doctrine\ORM\PersistentCollection {#1679 …}
+nested: Doctrine\ORM\PersistentCollection {#1668 …}
+votes: Doctrine\ORM\PersistentCollection {#1666 …}
+reports: Doctrine\ORM\PersistentCollection {#1669 …}
+favourites: Doctrine\ORM\PersistentCollection {#1549 …}
+notifications: Doctrine\ORM\PersistentCollection {#1573 …}
-id: 204267
-bodyTs: "'admin':74 'alia':33 'almost':46 'although':101 'anyway':44,126,140 'applic':5 'assign':65,69 'attack':49,78 'binari':68 'cap':72 'capabl':63 'care':106 'chang':28,97 'common':83 'comput':121 'configur':12 'container':3 'dac':61 'data':137 'detect':94 'e.g':119 'easi':92 'escal':87,122 'etc':138 'even':38 'extrem':36 'fair':127 'fulli':47 'given':129 'imag':15 'juici':133 'key':136 'machin':118 'make':31 'malwar':6 'mention':51,80 'mount':24 'namespac':25 'overrid':18,62 'persist':84 'person':120 'point':111 'prevent':45,102 'privileg':58,86 'probabl':141 'profil':100 'relat':91 'requir':71,104 'root':57,124 'run':8,39,142 'separ':23,42,54 'shell':99 'short':76 'singl':116 'single-us':115 'ssh':135 'stuff':134 'sudo':34 'sys':73 'trick':35 'under/owned':143 'unless':16,26,52 'unlik':37 'unnecessari':128 'user':11,43,55,117,146 'vector':88 'want':109 'watch':95"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/5856485"
+editedAt: null
+createdAt: DateTimeImmutable @1701900436 {#1429
date: 2023-12-06 23:07:16.0 +01:00
}
+"title": 204267
}
]
-id: 20409
-titleTs: "'7':1 'command':6 'linux':8 'sudo':5 'tweak':4 'way':2"
-bodyTs: null
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1701888483
+visibility: "visible "
+apId: "https://discuss.tchncs.de/post/7337171"
+editedAt: null
+createdAt: DateTimeImmutable @1701802083 {#2162
date: 2023-12-05 19:48:03.0 +01:00
}
+__isInitialized__: true
…2
} |
|
Show voter details
|
39 |
DENIED
|
edit
|
Proxies\__CG__\App\Entity\Entry {#1578
+user: Proxies\__CG__\App\Entity\User {#2057 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: Proxies\__CG__\App\Entity\Image {#2232 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2228 …}
+slug: "7-Ways-to-Tweak-Sudo-Command-in-Linux"
+title: "7 Ways to Tweak Sudo Command in Linux"
+url: "https://itsfoss.com/sudo-tips/"
+body: null
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 20
+favouriteCount: 61
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1701904582 {#2214
date: 2023-12-07 00:16:22.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2252 …}
+votes: Doctrine\ORM\PersistentCollection {#2189 …}
+reports: Doctrine\ORM\PersistentCollection {#2311 …}
+favourites: Doctrine\ORM\PersistentCollection {#2293 …}
+notifications: Doctrine\ORM\PersistentCollection {#2309 …}
+badges: Doctrine\ORM\PersistentCollection {#2302 …}
+children: [
App\Entity\EntryComment {#1595
+user: App\Entity\User {#261 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1578 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#1652 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#1654 …}
+body: """
If you containerize, the application (malware) will run under the user configured in the image, unless you override it, and in a separate mount namespace, unless you change that, which makes the “alias sudo” trick extremely unlikely.\n
\n
Even running under a separate user anyway prevents almost fully the attack you mention, unless the separate user has root privileges or the DAC_OVERRIDE capability is assigned to the binary (assigning it requires CAP_SYS_ADMIN).\n
\n
In short, the attack you mention is a common persistence and privilege escalation vector, which is relatively easy to detect (watch for changes to shell profiles), although preventing it requires some care. I just want to point out that in single-user machines (e.g. personal computers) escalating to root is anyway fairly unnecessary, given that all the juicy stuff (ssh keys, data, etc.) is anyway probably running under/owned by that user.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1701900436 {#1430
date: 2023-12-06 23:07:16.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@petsoi@discuss.tchncs.de"
"@Pantherina@feddit.de"
"@digdilem@lemmy.ml"
"@IAm_A_Complete_Idiot@sh.itjust.works"
]
+children: Doctrine\ORM\PersistentCollection {#1679 …}
+nested: Doctrine\ORM\PersistentCollection {#1668 …}
+votes: Doctrine\ORM\PersistentCollection {#1666 …}
+reports: Doctrine\ORM\PersistentCollection {#1669 …}
+favourites: Doctrine\ORM\PersistentCollection {#1549 …}
+notifications: Doctrine\ORM\PersistentCollection {#1573 …}
-id: 204267
-bodyTs: "'admin':74 'alia':33 'almost':46 'although':101 'anyway':44,126,140 'applic':5 'assign':65,69 'attack':49,78 'binari':68 'cap':72 'capabl':63 'care':106 'chang':28,97 'common':83 'comput':121 'configur':12 'container':3 'dac':61 'data':137 'detect':94 'e.g':119 'easi':92 'escal':87,122 'etc':138 'even':38 'extrem':36 'fair':127 'fulli':47 'given':129 'imag':15 'juici':133 'key':136 'machin':118 'make':31 'malwar':6 'mention':51,80 'mount':24 'namespac':25 'overrid':18,62 'persist':84 'person':120 'point':111 'prevent':45,102 'privileg':58,86 'probabl':141 'profil':100 'relat':91 'requir':71,104 'root':57,124 'run':8,39,142 'separ':23,42,54 'shell':99 'short':76 'singl':116 'single-us':115 'ssh':135 'stuff':134 'sudo':34 'sys':73 'trick':35 'under/owned':143 'unless':16,26,52 'unlik':37 'unnecessari':128 'user':11,43,55,117,146 'vector':88 'want':109 'watch':95"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/5856485"
+editedAt: null
+createdAt: DateTimeImmutable @1701900436 {#1429
date: 2023-12-06 23:07:16.0 +01:00
}
+"title": 204267
}
]
-id: 20409
-titleTs: "'7':1 'command':6 'linux':8 'sudo':5 'tweak':4 'way':2"
-bodyTs: null
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1701888483
+visibility: "visible "
+apId: "https://discuss.tchncs.de/post/7337171"
+editedAt: null
+createdAt: DateTimeImmutable @1701802083 {#2162
date: 2023-12-05 19:48:03.0 +01:00
}
+__isInitialized__: true
…2
} |
|
Show voter details
|
40 |
DENIED
|
moderate
|
Proxies\__CG__\App\Entity\Entry {#1578
+user: Proxies\__CG__\App\Entity\User {#2057 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: Proxies\__CG__\App\Entity\Image {#2232 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2228 …}
+slug: "7-Ways-to-Tweak-Sudo-Command-in-Linux"
+title: "7 Ways to Tweak Sudo Command in Linux"
+url: "https://itsfoss.com/sudo-tips/"
+body: null
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 20
+favouriteCount: 61
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1701904582 {#2214
date: 2023-12-07 00:16:22.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2252 …}
+votes: Doctrine\ORM\PersistentCollection {#2189 …}
+reports: Doctrine\ORM\PersistentCollection {#2311 …}
+favourites: Doctrine\ORM\PersistentCollection {#2293 …}
+notifications: Doctrine\ORM\PersistentCollection {#2309 …}
+badges: Doctrine\ORM\PersistentCollection {#2302 …}
+children: [
App\Entity\EntryComment {#1595
+user: App\Entity\User {#261 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1578 …2}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#1652 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#1654 …}
+body: """
If you containerize, the application (malware) will run under the user configured in the image, unless you override it, and in a separate mount namespace, unless you change that, which makes the “alias sudo” trick extremely unlikely.\n
\n
Even running under a separate user anyway prevents almost fully the attack you mention, unless the separate user has root privileges or the DAC_OVERRIDE capability is assigned to the binary (assigning it requires CAP_SYS_ADMIN).\n
\n
In short, the attack you mention is a common persistence and privilege escalation vector, which is relatively easy to detect (watch for changes to shell profiles), although preventing it requires some care. I just want to point out that in single-user machines (e.g. personal computers) escalating to root is anyway fairly unnecessary, given that all the juicy stuff (ssh keys, data, etc.) is anyway probably running under/owned by that user.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1701900436 {#1430
date: 2023-12-06 23:07:16.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@petsoi@discuss.tchncs.de"
"@Pantherina@feddit.de"
"@digdilem@lemmy.ml"
"@IAm_A_Complete_Idiot@sh.itjust.works"
]
+children: Doctrine\ORM\PersistentCollection {#1679 …}
+nested: Doctrine\ORM\PersistentCollection {#1668 …}
+votes: Doctrine\ORM\PersistentCollection {#1666 …}
+reports: Doctrine\ORM\PersistentCollection {#1669 …}
+favourites: Doctrine\ORM\PersistentCollection {#1549 …}
+notifications: Doctrine\ORM\PersistentCollection {#1573 …}
-id: 204267
-bodyTs: "'admin':74 'alia':33 'almost':46 'although':101 'anyway':44,126,140 'applic':5 'assign':65,69 'attack':49,78 'binari':68 'cap':72 'capabl':63 'care':106 'chang':28,97 'common':83 'comput':121 'configur':12 'container':3 'dac':61 'data':137 'detect':94 'e.g':119 'easi':92 'escal':87,122 'etc':138 'even':38 'extrem':36 'fair':127 'fulli':47 'given':129 'imag':15 'juici':133 'key':136 'machin':118 'make':31 'malwar':6 'mention':51,80 'mount':24 'namespac':25 'overrid':18,62 'persist':84 'person':120 'point':111 'prevent':45,102 'privileg':58,86 'probabl':141 'profil':100 'relat':91 'requir':71,104 'root':57,124 'run':8,39,142 'separ':23,42,54 'shell':99 'short':76 'singl':116 'single-us':115 'ssh':135 'stuff':134 'sudo':34 'sys':73 'trick':35 'under/owned':143 'unless':16,26,52 'unlik':37 'unnecessari':128 'user':11,43,55,117,146 'vector':88 'want':109 'watch':95"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/5856485"
+editedAt: null
+createdAt: DateTimeImmutable @1701900436 {#1429
date: 2023-12-06 23:07:16.0 +01:00
}
+"title": 204267
}
]
-id: 20409
-titleTs: "'7':1 'command':6 'linux':8 'sudo':5 'tweak':4 'way':2"
-bodyTs: null
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1701888483
+visibility: "visible "
+apId: "https://discuss.tchncs.de/post/7337171"
+editedAt: null
+createdAt: DateTimeImmutable @1701802083 {#2162
date: 2023-12-05 19:48:03.0 +01:00
}
+__isInitialized__: true
…2
} |
|
Show voter details
|
41 |
DENIED
|
ROLE_USER
|
null |
|
Show voter details
|
42 |
DENIED
|
moderate
|
App\Entity\EntryComment {#1595
+user: App\Entity\User {#261 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1578
+user: Proxies\__CG__\App\Entity\User {#2057 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: Proxies\__CG__\App\Entity\Image {#2232 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2228 …}
+slug: "7-Ways-to-Tweak-Sudo-Command-in-Linux"
+title: "7 Ways to Tweak Sudo Command in Linux"
+url: "https://itsfoss.com/sudo-tips/"
+body: null
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 20
+favouriteCount: 61
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1701904582 {#2214
date: 2023-12-07 00:16:22.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2252 …}
+votes: Doctrine\ORM\PersistentCollection {#2189 …}
+reports: Doctrine\ORM\PersistentCollection {#2311 …}
+favourites: Doctrine\ORM\PersistentCollection {#2293 …}
+notifications: Doctrine\ORM\PersistentCollection {#2309 …}
+badges: Doctrine\ORM\PersistentCollection {#2302 …}
+children: [
App\Entity\EntryComment {#1595}
]
-id: 20409
-titleTs: "'7':1 'command':6 'linux':8 'sudo':5 'tweak':4 'way':2"
-bodyTs: null
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1701888483
+visibility: "visible "
+apId: "https://discuss.tchncs.de/post/7337171"
+editedAt: null
+createdAt: DateTimeImmutable @1701802083 {#2162
date: 2023-12-05 19:48:03.0 +01:00
}
+__isInitialized__: true
…2
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#1652 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#1654 …}
+body: """
If you containerize, the application (malware) will run under the user configured in the image, unless you override it, and in a separate mount namespace, unless you change that, which makes the “alias sudo” trick extremely unlikely.\n
\n
Even running under a separate user anyway prevents almost fully the attack you mention, unless the separate user has root privileges or the DAC_OVERRIDE capability is assigned to the binary (assigning it requires CAP_SYS_ADMIN).\n
\n
In short, the attack you mention is a common persistence and privilege escalation vector, which is relatively easy to detect (watch for changes to shell profiles), although preventing it requires some care. I just want to point out that in single-user machines (e.g. personal computers) escalating to root is anyway fairly unnecessary, given that all the juicy stuff (ssh keys, data, etc.) is anyway probably running under/owned by that user.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1701900436 {#1430
date: 2023-12-06 23:07:16.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@petsoi@discuss.tchncs.de"
"@Pantherina@feddit.de"
"@digdilem@lemmy.ml"
"@IAm_A_Complete_Idiot@sh.itjust.works"
]
+children: Doctrine\ORM\PersistentCollection {#1679 …}
+nested: Doctrine\ORM\PersistentCollection {#1668 …}
+votes: Doctrine\ORM\PersistentCollection {#1666 …}
+reports: Doctrine\ORM\PersistentCollection {#1669 …}
+favourites: Doctrine\ORM\PersistentCollection {#1549 …}
+notifications: Doctrine\ORM\PersistentCollection {#1573 …}
-id: 204267
-bodyTs: "'admin':74 'alia':33 'almost':46 'although':101 'anyway':44,126,140 'applic':5 'assign':65,69 'attack':49,78 'binari':68 'cap':72 'capabl':63 'care':106 'chang':28,97 'common':83 'comput':121 'configur':12 'container':3 'dac':61 'data':137 'detect':94 'e.g':119 'easi':92 'escal':87,122 'etc':138 'even':38 'extrem':36 'fair':127 'fulli':47 'given':129 'imag':15 'juici':133 'key':136 'machin':118 'make':31 'malwar':6 'mention':51,80 'mount':24 'namespac':25 'overrid':18,62 'persist':84 'person':120 'point':111 'prevent':45,102 'privileg':58,86 'probabl':141 'profil':100 'relat':91 'requir':71,104 'root':57,124 'run':8,39,142 'separ':23,42,54 'shell':99 'short':76 'singl':116 'single-us':115 'ssh':135 'stuff':134 'sudo':34 'sys':73 'trick':35 'under/owned':143 'unless':16,26,52 'unlik':37 'unnecessari':128 'user':11,43,55,117,146 'vector':88 'want':109 'watch':95"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/5856485"
+editedAt: null
+createdAt: DateTimeImmutable @1701900436 {#1429
date: 2023-12-06 23:07:16.0 +01:00
}
+"title": 204267
} |
|
Show voter details
|
43 |
DENIED
|
edit
|
App\Entity\EntryComment {#1595
+user: App\Entity\User {#261 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1578
+user: Proxies\__CG__\App\Entity\User {#2057 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: Proxies\__CG__\App\Entity\Image {#2232 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2228 …}
+slug: "7-Ways-to-Tweak-Sudo-Command-in-Linux"
+title: "7 Ways to Tweak Sudo Command in Linux"
+url: "https://itsfoss.com/sudo-tips/"
+body: null
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 20
+favouriteCount: 61
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1701904582 {#2214
date: 2023-12-07 00:16:22.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2252 …}
+votes: Doctrine\ORM\PersistentCollection {#2189 …}
+reports: Doctrine\ORM\PersistentCollection {#2311 …}
+favourites: Doctrine\ORM\PersistentCollection {#2293 …}
+notifications: Doctrine\ORM\PersistentCollection {#2309 …}
+badges: Doctrine\ORM\PersistentCollection {#2302 …}
+children: [
App\Entity\EntryComment {#1595}
]
-id: 20409
-titleTs: "'7':1 'command':6 'linux':8 'sudo':5 'tweak':4 'way':2"
-bodyTs: null
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1701888483
+visibility: "visible "
+apId: "https://discuss.tchncs.de/post/7337171"
+editedAt: null
+createdAt: DateTimeImmutable @1701802083 {#2162
date: 2023-12-05 19:48:03.0 +01:00
}
+__isInitialized__: true
…2
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#1652 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#1654 …}
+body: """
If you containerize, the application (malware) will run under the user configured in the image, unless you override it, and in a separate mount namespace, unless you change that, which makes the “alias sudo” trick extremely unlikely.\n
\n
Even running under a separate user anyway prevents almost fully the attack you mention, unless the separate user has root privileges or the DAC_OVERRIDE capability is assigned to the binary (assigning it requires CAP_SYS_ADMIN).\n
\n
In short, the attack you mention is a common persistence and privilege escalation vector, which is relatively easy to detect (watch for changes to shell profiles), although preventing it requires some care. I just want to point out that in single-user machines (e.g. personal computers) escalating to root is anyway fairly unnecessary, given that all the juicy stuff (ssh keys, data, etc.) is anyway probably running under/owned by that user.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1701900436 {#1430
date: 2023-12-06 23:07:16.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@petsoi@discuss.tchncs.de"
"@Pantherina@feddit.de"
"@digdilem@lemmy.ml"
"@IAm_A_Complete_Idiot@sh.itjust.works"
]
+children: Doctrine\ORM\PersistentCollection {#1679 …}
+nested: Doctrine\ORM\PersistentCollection {#1668 …}
+votes: Doctrine\ORM\PersistentCollection {#1666 …}
+reports: Doctrine\ORM\PersistentCollection {#1669 …}
+favourites: Doctrine\ORM\PersistentCollection {#1549 …}
+notifications: Doctrine\ORM\PersistentCollection {#1573 …}
-id: 204267
-bodyTs: "'admin':74 'alia':33 'almost':46 'although':101 'anyway':44,126,140 'applic':5 'assign':65,69 'attack':49,78 'binari':68 'cap':72 'capabl':63 'care':106 'chang':28,97 'common':83 'comput':121 'configur':12 'container':3 'dac':61 'data':137 'detect':94 'e.g':119 'easi':92 'escal':87,122 'etc':138 'even':38 'extrem':36 'fair':127 'fulli':47 'given':129 'imag':15 'juici':133 'key':136 'machin':118 'make':31 'malwar':6 'mention':51,80 'mount':24 'namespac':25 'overrid':18,62 'persist':84 'person':120 'point':111 'prevent':45,102 'privileg':58,86 'probabl':141 'profil':100 'relat':91 'requir':71,104 'root':57,124 'run':8,39,142 'separ':23,42,54 'shell':99 'short':76 'singl':116 'single-us':115 'ssh':135 'stuff':134 'sudo':34 'sys':73 'trick':35 'under/owned':143 'unless':16,26,52 'unlik':37 'unnecessari':128 'user':11,43,55,117,146 'vector':88 'want':109 'watch':95"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/5856485"
+editedAt: null
+createdAt: DateTimeImmutable @1701900436 {#1429
date: 2023-12-06 23:07:16.0 +01:00
}
+"title": 204267
} |
|
Show voter details
|
44 |
DENIED
|
moderate
|
App\Entity\EntryComment {#1595
+user: App\Entity\User {#261 …}
+entry: Proxies\__CG__\App\Entity\Entry {#1578
+user: Proxies\__CG__\App\Entity\User {#2057 …}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: Proxies\__CG__\App\Entity\Image {#2232 …}
+domain: Proxies\__CG__\App\Entity\Domain {#2228 …}
+slug: "7-Ways-to-Tweak-Sudo-Command-in-Linux"
+title: "7 Ways to Tweak Sudo Command in Linux"
+url: "https://itsfoss.com/sudo-tips/"
+body: null
+type: "link"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 20
+favouriteCount: 61
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1701904582 {#2214
date: 2023-12-07 00:16:22.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2252 …}
+votes: Doctrine\ORM\PersistentCollection {#2189 …}
+reports: Doctrine\ORM\PersistentCollection {#2311 …}
+favourites: Doctrine\ORM\PersistentCollection {#2293 …}
+notifications: Doctrine\ORM\PersistentCollection {#2309 …}
+badges: Doctrine\ORM\PersistentCollection {#2302 …}
+children: [
App\Entity\EntryComment {#1595}
]
-id: 20409
-titleTs: "'7':1 'command':6 'linux':8 'sudo':5 'tweak':4 'way':2"
-bodyTs: null
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1701888483
+visibility: "visible "
+apId: "https://discuss.tchncs.de/post/7337171"
+editedAt: null
+createdAt: DateTimeImmutable @1701802083 {#2162
date: 2023-12-05 19:48:03.0 +01:00
}
+__isInitialized__: true
…2
}
+magazine: Proxies\__CG__\App\Entity\Magazine {#1575 …}
+image: null
+parent: Proxies\__CG__\App\Entity\EntryComment {#1652 …}
+root: Proxies\__CG__\App\Entity\EntryComment {#1654 …}
+body: """
If you containerize, the application (malware) will run under the user configured in the image, unless you override it, and in a separate mount namespace, unless you change that, which makes the “alias sudo” trick extremely unlikely.\n
\n
Even running under a separate user anyway prevents almost fully the attack you mention, unless the separate user has root privileges or the DAC_OVERRIDE capability is assigned to the binary (assigning it requires CAP_SYS_ADMIN).\n
\n
In short, the attack you mention is a common persistence and privilege escalation vector, which is relatively easy to detect (watch for changes to shell profiles), although preventing it requires some care. I just want to point out that in single-user machines (e.g. personal computers) escalating to root is anyway fairly unnecessary, given that all the juicy stuff (ssh keys, data, etc.) is anyway probably running under/owned by that user.
"""
+lang: "en"
+isAdult: false
+favouriteCount: 0
+score: 0
+lastActive: DateTime @1701900436 {#1430
date: 2023-12-06 23:07:16.0 +01:00
}
+ip: null
+tags: null
+mentions: [
"@petsoi@discuss.tchncs.de"
"@Pantherina@feddit.de"
"@digdilem@lemmy.ml"
"@IAm_A_Complete_Idiot@sh.itjust.works"
]
+children: Doctrine\ORM\PersistentCollection {#1679 …}
+nested: Doctrine\ORM\PersistentCollection {#1668 …}
+votes: Doctrine\ORM\PersistentCollection {#1666 …}
+reports: Doctrine\ORM\PersistentCollection {#1669 …}
+favourites: Doctrine\ORM\PersistentCollection {#1549 …}
+notifications: Doctrine\ORM\PersistentCollection {#1573 …}
-id: 204267
-bodyTs: "'admin':74 'alia':33 'almost':46 'although':101 'anyway':44,126,140 'applic':5 'assign':65,69 'attack':49,78 'binari':68 'cap':72 'capabl':63 'care':106 'chang':28,97 'common':83 'comput':121 'configur':12 'container':3 'dac':61 'data':137 'detect':94 'e.g':119 'easi':92 'escal':87,122 'etc':138 'even':38 'extrem':36 'fair':127 'fulli':47 'given':129 'imag':15 'juici':133 'key':136 'machin':118 'make':31 'malwar':6 'mention':51,80 'mount':24 'namespac':25 'overrid':18,62 'persist':84 'person':120 'point':111 'prevent':45,102 'privileg':58,86 'probabl':141 'profil':100 'relat':91 'requir':71,104 'root':57,124 'run':8,39,142 'separ':23,42,54 'shell':99 'short':76 'singl':116 'single-us':115 'ssh':135 'stuff':134 'sudo':34 'sys':73 'trick':35 'under/owned':143 'unless':16,26,52 'unlik':37 'unnecessari':128 'user':11,43,55,117,146 'vector':88 'want':109 'watch':95"
+ranking: 0
+commentCount: 0
+upVotes: 0
+downVotes: 0
+visibility: "visible "
+apId: "https://lemmy.world/comment/5856485"
+editedAt: null
+createdAt: DateTimeImmutable @1701900436 {#1429
date: 2023-12-06 23:07:16.0 +01:00
}
+"title": 204267
} |
|
Show voter details
|
45 |
DENIED
|
ROLE_ADMIN
|
null |
|
Show voter details
|
46 |
DENIED
|
ROLE_MODERATOR
|
null |
|
Show voter details
|