Containers, Security and Echo chambers

Containers, Security and Echo chambers

  • May 22, 2018
Table of Contents

Containers, Security and Echo chambers

There seems to be some confusion around sandboxing containers as of late, mostly because of the recent launch of gvisor. Before I get into the body of this post I would like to make one thing clear. I have no problem with gvisor itself.

I think it is very technically “cool.” I do have a problem with the messaging around it and marketing. When you work at a large organization you are surrounded by an echo chamber.

So if everyone in the org is saying “containers are not secure,” you are bound to believe it and not research actual facts. To be clear I am not saying containers are secure, literally nothing is secure. Spreading FUD while ignorant or not doing proper research is harmful to the facts and hard work many people put in to making containers at least decently isolated by default.

There is another problem I have with gvisor. In my opinion, I think it would be quite hard to operate. People enjoy debugging with certain workflows and reinventing syscalls is going to be quite hard to debug.

Just look up one of Bryan Cantrill’s rants on unikernels which are harder to debug as well. I am not trying to throw shade at gvisor but merely clear up some FUD in the world of open source marketing. I truly believe that people choosing projects to use should research into them and not just choose something shiny that came out of Big Corp.

I also believe that people at Big Corp should embrace the work and ideas of people outside their echo chamber. Sometimes they even work in the echo chamber but just don’t abide by the echo chamber beliefs.

Source: jessfraz.com

Share :
comments powered by Disqus

Related Posts

Gardener: Manage Kubernetes clusters across multiple cloud providers

Gardener: Manage Kubernetes clusters across multiple cloud providers

Many Open Source tools exist which help in creating and updating single Kubernetes clusters. However, the more clusters you need the harder it becomes to operate, monitor, manage and keep all of them alive and up-to-date. And that is exactly what project Gardener focuses on.

Read More
How much of the Internet is using QUIC?

How much of the Internet is using QUIC?

It’s been five years since Google launched QUIC — a new transport protocol that is deployed on the shoulders of UDP in user space. QUIC offers similar properties as TCP + TLS 1.3 but promises to incorporate new features more easily and without them being dropped by legacy systems that don’t support them, for example, middleboxes that block new TCP features — a problem that TCP has faced since its initial deployment. QUIC tackles the problem by offering a fully encrypted transport protocol, thereby removing the possibility for middleboxes to alter its content.

Read More