ftbd

joined 1 year ago
[–] ftbd@feddit.org 3 points 9 hours ago

This is not about vetoing EU decisions. This is about failing to ratify EU regulations in Poland

[–] ftbd@feddit.org 2 points 14 hours ago (1 children)

Which of these is far left?

[–] ftbd@feddit.org 2 points 17 hours ago (3 children)

What's wrong with VSCode? There's an open source version (codium) which works just as well for me.

[–] ftbd@feddit.org 8 points 6 days ago (1 children)

What does this have to do with security? Do they expect evil maid attacks on the PS5 people carry around to do their online banking on?

[–] ftbd@feddit.org 23 points 6 days ago

I wonder where the 2A crowd that wants to "protect the people from a tyrannical government" is. Oh wait, this is them!

[–] ftbd@feddit.org 2 points 1 week ago (1 children)

Hier ging es doch um die Nutzung von Musik aus dem Spotify-Backup auf Anna's Archive

[–] ftbd@feddit.org 1 points 1 week ago

Granted. You should brush up on your tensor calculus, though.

[–] ftbd@feddit.org 1 points 1 week ago

Ich habe mir brave zugegebenermaßen nur kurz angeschaut, war aber enttäuscht dass dort irgendeine selbst entwickelte Cryptowährung gepusht wird

[–] ftbd@feddit.org 8 points 3 weeks ago (1 children)

But I think 'encrypt home directory' only encrypts your home partition, not your root partition. Not sure why many distros offer only this option in the graphical installer

[–] ftbd@feddit.org 39 points 3 weeks ago (2 children)

Du verbringst drei Wochen bei deinen Eltern? Ich würde sagen dass ich ein recht gutes Verhältnis zu meinen hab, aber nach 3-4 Tagen gehen sie mir trotzdem auf die Nerven

[–] ftbd@feddit.org 1 points 4 weeks ago (1 children)

I'd say those are deductions rather than taxes. Taxes just fill the state's budget, but are not earmarked for specific purposes the same way a car payment is.

[–] ftbd@feddit.org 6 points 1 month ago

Don't put your cob in that

 

Hi everyone!

I'm in the process of finally doing containers right in my NixOS installation. This is my 'wishlist':

  • podman containers should be run by users with minimal permissions
  • separate user per container
  • containers managed by systemd services for easier management

My current work-in-progress setup looks like this:

For each service (called $name), I have:

  • a user and corresponding group (referred to as $uid in the following)
  • a directory /srv/$name owned by $uid, in which mounted volumes are located

My containers are declared like this:

virtualisation.oci-containers.containers = {
    $name = {
        image = ...;
        ports = [ ... ];
        volumes = [
            "/srv/${name}/config:/config"
            ...
        ];
        user = $uid:$gid;
        extraOptions = [
            "--security-opt=no-new-privileges:true"
        ];
    };
};

Now for the parts I don't fully understand yet:

  • some images allow setting environment.PUID to specify a user. Does setting this option (and not setting user=$uid in the container declaration itself) mean that the container will be run as root, and the program inside will merely use PUID when e.g. creating files? This would still allow a malicious container to run commands as root on the host, right?

  • virtualisation.oci-containers.containers creates a systemd service. Since this is not a user-service for my user $uid, I need sudo to start/stop the container. Does that mean that the systemd service is run with root permissions, but it executes the command to spawn the container as $uid? If whatever is running inside the container was malicious, is there a functional difference between the container being started 'by root as $uid' and it being started by me (after logging in as $uid)?

  • Is it feasible to make these systemd services user-services owned by $uid instead?

  • Are there further hardening steps I forgot about?

Thanks for your input!

view more: next ›