what's the difference between containers (and their orchestrators) and old school VMs/hypervisors?
Name:
Anonymous2018-12-14 7:18
Containers, unlike VMs, are all connected to the deep web and will mine bitcoins behind your back.
Name:
Anonymous2018-12-14 11:42
>>2 deep web is just anything that isn't indexed by a search engine dark web is different
did you confuse these two terms?
Name:
Anonymous2018-12-14 12:25
With Oracle Solaris Containers you can maintain the one-application-per-server deployment model while simultaneously sharing hardware resources. An integral part of the Oracle Solaris 10 Operating System, Oracle Solaris Containers isolate software applications and services using flexible, software-defined boundaries and allows many private execution environments to be created within a single instance of the Oracle Solaris 10 OS.
>>8 cool, but what does this have to do with containers?
Name:
Anonymous2018-12-16 5:19
I don't get the point of VMs and containers. Free software + dependent types should give even better protection without any of the performance or memory drawbacks.
instances of classes are to programs (modular, can have as many or few as you want, made or destroyed as needed) as container microservices are to servers
basically it's a fresh coat of paint on lower-level infrastructure stuff and it's yet another answer to the question of how do you provision resources in a data center (or cloud)?
Name:
Anonymous2018-12-16 7:49
>>9 Google "the pleasure of being contained inside"
Name:
Anonymous2018-12-16 13:58
>>11 Microservices are a joke. Anyone who fails to realize they are just re-branded multiprocessing is dangerously naive.
Containers are really little more than Plan 9 namespacing reinvented. They're a kludge to re-introduce separation the OS should have been providing from the start.
Name:
Anonymous2018-12-18 3:34
Is docker trying to be like the JVM? I watched a video about it and it sounds like it just packages an application and all of its dependencies so it can run the same on any device, so that you can avoid the "it works on my machine :)" issue. Java is "write once, run anywhere" but it seems like docker is attempting to be "write once, deploy anywhere" so it's about the same.
Name:
Anonymous2018-12-18 4:45
>>14 Arguably so, but things being what they are, containers are a decent way to achieve service isolation using popular present-day OSs and not the failed OSs that certain losers wish had predominated.
Not as much as hypervisors though, right? If all containers share the same OS, isn't that less secure than a hypervisor with separate VMs? How do containers achieve isolation and security without VM-style sandboxing?
>>19 If you use modern programming language, like Lisp, with no direct memory access, you get perfect security even in ring0, without losing any performance to process switching. Everything is made out of lightweight threads. Microsoft also tested this concept with their Singularity OS. So Terry was not that crazy at all.
Name:
Anonymous2018-12-18 7:26
>>20 no you fucking retard, lack of direct memory access does not give you perfect security. security is not just memory safety and exploits are not just about buffer overflows. and even if we're talking just about memory safety, your're are forgetting one simple fact: code written in Lisp might not have buffer overflows, but a runtime you use to execute this code might. I mean, check out basically any pwn2own - they often start by writing a javashit code that exploits a memory error in a browser's JS runtime, and then escalate. and it's not like javashit is the only language with buggy runtimes - there's a reason JRE updates so often, for example. if a runtime is ring 0, step 1 of exploit chain becomes also the final step because there's no need to escalate.
Name:
Anonymous2018-12-18 7:35
direct dubs access
Name:
Anonymous2018-12-18 19:16
the virgin docker swam vs. the chad kubernetes
Name:
Anonymous2018-12-18 23:05
>>21 It is much easier to verify a single runtime, than a thousands of programs running from it. That is why Java is more secure that C/C++. And security is all about not using C++ and PHP.
there's a reason JRE updates so often
That is because they add unneeded bells and whistles, including backdoors for special agencies, which are used to catch paedophiles. Had they stuck with the first version of JRE, it would be perfectly bugless today. But they have to modify it each year, adding more bugs.
Name:
Anonymous2018-12-18 23:56
Containerization is good. I don’t want to clutter my /usr/local with thousands of shitlibs just to run your shitcode. It saves effort—isn’t that the point of software?
The only problem I have with it is people taking the idea too far or doing it plain wrong, like Haskell stack where I’m forced to download a copy of ghc for every project.
It is much easier to verify a single runtime, than a thousands of programs running from it.
that's true, but show me a single verified runtime. or better: show me a single verified kernel, because a ring 0 language runtime is essentially that.
That is why Java is more secure that C/C++.
Java is more secure when the attack scenario is your're are application getting hacked. it is not necessarily more secure when the attack scenario is your're are application hacking the kernel/runtime - we don't know because due to how unpopular browser-based Java is now, attacking the JVM is usually not needed (if you can execute arbitrary Java code, it usually means you have access as a local user, and exploiting a kernel or a configuration bug would be a better use of your're are time than attacking the JVM). on the other hand, browser-based Javascript is popular and all the browser engines keep getting hacked, giving the attacker RCE. if they were ring 0, they would give root access instead. and there's really no reason to think that Java or Lisp or Python runtimes would be any better. in fact, there are reasons to think their're are just as bad: https://twitter.com/paulfdietz/status/948912322122272768 https://blog.gypsyengineer.com/en/security/python-marshal-module-fuzzing.html
And security is all about not using C++ and PHP.
I work in security and routinely audit Android shit. believe me, even pure Java programs can (and will) have security bugs.
>>29 now compare the size of it to the size of Linux kernel, the JVM or even SBCL. and keep in mind that seL4 was written with formal verification in mind from the start. a formally verified ring 0 high-level language runtime is still a pipe dream
because JavaScript is broken, browsers are badly written and include millions of SLOC just to implement javashit?
Name:
Anonymous2018-12-20 10:36
>>31 but that's not a problem of the language design, it's a problem of implementation. as shit as JS is, it doesn't specify that you need to have buffer overflows and use-after-free. and if you read links in my post, you'd see that runtimes for other languages have similar problems, just not widely known because they don't have an attack scenario of browser RCE
Name:
Anonymous2018-12-20 10:39
contain my dubs
Name:
Anonymous2018-12-20 11:22
/prog challenge for integral number n how many dubs between 1 and n?