Does anyone know of a hosting service that offers Silverblue as a possible choice for OS?

It seems to me that for a server running only docker services the greatly reduced attack surface of an immutable distro presents a definitive advantage.

  • StrawberryPigtails@lemmy.sdf.org
    link
    fedilink
    English
    arrow-up
    10
    ·
    3 months ago

    I don’t know about Silverblue, but I know you can use NixOS on pretty much any VPS using the tool nixos-infect.

    Not sure how it would reduce your attack surface though. That’s not really the problem that they are trying to solve.

  • cizra@lemm.ee
    link
    fedilink
    English
    arrow-up
    8
    ·
    3 months ago

    I’m using NixOS in Azure - Azure allows creating a VM out of a disk image, and NixOS has tools to create preconfigured disk images. You inject your SSH keys and stuff straight into the image, then upload and create a VM. A bit fiddly, but I got it to work.

  • 908musdf@lemmy.one
    link
    fedilink
    English
    arrow-up
    2
    ·
    3 months ago

    I will respond even though this post is several days old because I actually do this. I have some vpses on Hetzner that run Silverblue no problem. It is not an install option available by default there, but support uploaded an iso under my account quickly when asked.

    If you do it, change the active firewalld zone. The default is for a desktop, so not great for vps space.

      • aordogvan@lemmy.worldOP
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        2
        ·
        3 months ago

        Because even if an attacker could gain access even as root he cannot modify system files. This is why immutable OS distros are called immutable.

          • MalReynolds@slrpnk.net
            link
            fedilink
            English
            arrow-up
            1
            ·
            3 months ago

            Absitively, use case here IMO is set and forget autoupdate to stay current and SELinux (which actually reduces surface)

          • asap@lemmy.world
            link
            fedilink
            English
            arrow-up
            1
            arrow-down
            1
            ·
            edit-2
            3 months ago

            They 100% can.

            An attacker escaping from a container can’t be system root as Podman runs rootless (without some other exploit or weak password).

            The filesystem itself is also read-only.

            /dev/nvme0n1p4 on /sysroot type xfs (ro)
            /dev/nvme0n1p4 on /usr type xfs (ro)
            /dev/nvme0n1p3 on /boot type ext4 (ro)
            
            • myersguy@lemmy.simpl.website
              link
              fedilink
              English
              arrow-up
              4
              ·
              edit-2
              3 months ago

              An attacker escaping from a container can’t be system root as Podman runs rootless (without some other exploit or weak password).

              That would be true of podman running anywhere, and is not unique to an immutable distribution.

              The filesystem itself is also read-only.

              You can change that real quick if you have root access.

              • asap@lemmy.world
                link
                fedilink
                English
                arrow-up
                1
                ·
                edit-2
                3 months ago

                edit: “Immutable” means “all of them are the same”, not “unchangeable”.

                You sound confident, but the fact that Fedora is using the term “immutable” makes me wonder if you actually have domain expertise here.

                Immutable means immutable. It would be strange for them to call it that if it actually means “completely irrelevant from a security perspective”.

                Unless you provide some evidence to the contrary I’m going to assume you aren’t correct.

                • superkret@feddit.org
                  link
                  fedilink
                  English
                  arrow-up
                  6
                  ·
                  3 months ago

                  The immutability isn’t designed to protect against a malicious attacker with root access.
                  Any system is fucked if that happens.
                  It’s designed to reduce the workload of the maintainers, because they effectively only need to test and build for one standard image.

                • myersguy@lemmy.simpl.website
                  link
                  fedilink
                  English
                  arrow-up
                  2
                  ·
                  3 months ago

                  Someone with root can run ostree admin unlock --hotfix to make /usr writable. Someone with root can also delete all restore points.

                  It would be strange for them to call it that if it actually means “completely irrelevant from a security perspective”.

                  See the comment by superkret.