Why is it safer to run as non-root inside a single-user container that is deployed with rootless podman?

According to the JellyFin documentation

Podman doesn’t require root access to run containers, although there are some details to be mindful of; see the relevant documentation. For security, the Jellyfin container should be run using rootl… Continue reading Why is it safer to run as non-root inside a single-user container that is deployed with rootless podman?

Is using a singularity sandbox an effective way to increase security through isolation / compartmentalization?

I am using singularity sandboxes in my workflow for several reasons unrelated to security. However, after using it a bit, I am now wondering: is using a singularity sandbox an effective way to increase security by enforcing isolation / com… Continue reading Is using a singularity sandbox an effective way to increase security through isolation / compartmentalization?

What’re the most common vulnerabilities/weaknesses an attacker would exploit to gain SSH access to a container?

Fair warning – I am a security newbie.
In all container escape/breakout vulnerability scenarios I’ve read (CVE-2022-0185), the author assumes or states that the attacker already had shell or SSH access to the container. When I follow this … Continue reading What’re the most common vulnerabilities/weaknesses an attacker would exploit to gain SSH access to a container?

What are the potential vulnerabilities with containerized rootless Chrome and –no-sandbox?

I’m evaluating running Chromium without native sandboxing in a rootless container. A few points:

You can containerize Chrome using rootless containers with something like podman. This will utilize kernel user-namespaces to isolate the Chr… Continue reading What are the potential vulnerabilities with containerized rootless Chrome and –no-sandbox?