Can I protect a container with sysbox from root access? #865
-
Hello! I'm Junior Engineer in system software I'm sorry about my english description(not familiar with eng) |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment
-
Hi @chankim9321, sorry for the late reply. When you run an app inside a Docker + Sysbox container, you are isolating the app using the Linux user-namespace (i.e., the container has a "fake root" environment, where the root in the container maps to an unprivileged user on the host). In other words, it's harder for the app to breach the host, compared to a regular Docker container. Having said that, the protection is from app->host, not the other way around. That is, a user that has root on the host can do anything on it, including peeking into the app running inside container. Not sure if that answers your question or not. Sysbox runs on Linux, and should also run well as on Windows WSL, though we don't actively test on it. |
Beta Was this translation helpful? Give feedback.
Hi @chankim9321, sorry for the late reply.
When you run an app inside a Docker + Sysbox container, you are isolating the app using the Linux user-namespace (i.e., the container has a "fake root" environment, where the root in the container maps to an unprivileged user on the host). In other words, it's harder for the app to breach the host, compared to a regular Docker container.
Having said that, the protection is from app->host, not the other way around. That is, a user that has root on the host can do anything on it, including peeking into the app running inside container.
Not sure if that answers your question or not.
Sysbox runs on Linux, and should also run well as on Windows WSL, t…