Hello Thorsten,

Regarding the discussion about container isolation, I wanted to point you
to an alternative to Docker called "Podman" which is designed with a strong
focus on rootless containers and enhanced isolation.

You might find the following resource helpful:
https://www.redhat.com/en/blog/rootless-containers-podman. It provides an
overview of Podman and its capabilities for running containers without
elevated privileges, offering more robust isolation options compared to
`--privileged` Docker runs. Note that podman is packaged and reasonably
uptodate in Debian trixie.

I hope this information is useful for your testing needs.

Best regards,
Reinhard


On Sat, Aug 23, 2025 at 2:03 PM Thorsten Glaser <[email protected]> wrote:

> Hello Tianon,
>
> >I'd describe the "--privileged" flag you're using in this context is
> >"please, Docker, remove ALL security/isolation"
>
> this is certainly NOT something that comes across. I got the impression
> that it merely allows some more things *inside* the chroot.
>
> >You very, very certainly want a more specific set of "--cap-add" and
>
> Yes, probably, but it doesn’t make it easy for me to know how/which.
>
> >"--device" flags if you want even a semblance of security in your
> >deployment.
>
> I don’t *have* a “deployment”. I need to run some commands inside
> some random container, that’s all.
>
> Thanks,
> //mirabilos
> --
> 15:41⎜<Lo-lan-do:#fusionforge> Somebody write a testsuite for helloworld
> :-)
>
>

-- 
regards,
    Reinhard

Reply via email to