Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

And you may be surprised that I ran socket activation well over 15 years ago, so yes I'm well aware of the approach. The comment is more around the fact that in CoreOS's post they seems to harp on the security of a daemon process running as root that is responsible for spawning containers. What I'm saying is that with socket activation you will essentially have that again. Rocket can only work around it today because they have systemd as PID 1 running as root doing the socket activation.


With capabilities there is no need to have privileges beyond port binding and (possibly) userid assignment, no?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: