• kungen@feddit.nu
      link
      fedilink
      arrow-up
      2
      ·
      4 days ago

      That’d be an unusual setup. If you have users deploying containers on your host – that you trust enough to run whatever containers, but don’t want to give them ssh to the host – you’d usually have some kind of frontend such as Portioner, where you can have container exec and such.

      Containerization is not virtualization. It’s very possible to break out of containers, especially if configured badly, or if there are any found exploits in the container engine or even the kernel. Containers are “good enough” for the majority of projects, but it has never been designed to be a truly hardened sandbox.

      Basically, if you’re running an OpenSSH server inside a container, it’s likely that you’ve gotten the wrong ideas about securing your environment, and thus some old libraries in an old Debian image is the least of your worries.

    • chunkystyles@sopuli.xyz
      link
      fedilink
      English
      arrow-up
      2
      ·
      4 days ago

      I don’t understand this scenario. I can’t fathom why this would ever be the case. It sounds like either a very poor use of containers, or a very niche situation that I just don’t understand.

    • redjard@lemmy.dbzer0.com
      link
      fedilink
      arrow-up
      2
      ·
      4 days ago

      Sounds like a VPS. I doubt docker is sandboxed securely enough you’d want to use it for such an operation. VPS to my knowledge is done by virtual machine.