I just stumbled upon these news:
The linked Mastodon thread started by Lennart Poettering gives more insight.
One particular exchange of words starting from this post caught my attention:
@pid_eins Slowly but surely, systemd is turning into a container engine and I’m here for it!
Out of curiosity, did you ever take a look at boot2container (gfx-ci / Boot2container · GitLab)? It is my podman- and u-root based initrd that boots any container(s) without any installation, based on the kernel cmdline.
That’s IMO the next level of flexibility, but I must admit I have not worked on its security at all… but this is mostly meant for CI purposes (DUTs or gateway) so the needs are different.
@mupuf OCI/podman is really not my world, sorry. I didn’t drink that cool-aid.
@pid_eins aside from OCI or DDIs, are there any plans for a more practical or efficient image format?
It currently feels somewhat cumbersome to try to generate and distribute raw ddi’s + extensions for things like portable services or nspawn. It also feels a bit wasteful when you’re basing multiple containers on the same image.
I’d love to see something git- or ostree-like…
@risen uh, i am happy with ddis.
To say this politely I am not a believer and the security model ostree folks and OCI folks subscribe to. I subscribe to the idea that we should do W^X also for file systems: i.e. a file system is either writable, or it may contain executable files, but never both, as part of guaranteeing that attackers cannot gain persistency, no matter what.
DDIs fit perfectly into the model, but ostree (regardless with or without composefs glue) does conceptually not come close, and well, OCI is just terrible by any standard.
(DDI stands for Discoverable Disk Image.)
Now I really wonder why Lennart Poettering thinks that “OCI is just terrible by any standard”… Maybe someone here knows more about the underlying dispute?