SHARE
Facebook X Pinterest WhatsApp

LinuxCon: Running Containers in a Hostile Environment

Aug 24, 2016

TORONTO — Containers offer many different security benefitA and can even be used to run hacking competitions, without being hacked itself. In a session at the LinuxCon ContainerCon conference in Toronto  Stéphane Graber LXD Technical Lead at Canonical Ltd detailed how the NorthSec captureLXD the flag contest makes use of containers (specifically LXC) to enable the contest.

The whole setup involved no less than 11,387 Linux containers and an all IPv6 network that was setup to mimic the real Internet, but could only run locally. Graber said that the network setup really makes it feel like hackers on the real internet.

To secure all the containers, Graber and the NorthSec team use the LXD daemon to further isolate the containers and provide security.

Over the course of a very detailed technical overview, Graber explained that full configuration setup that enabled the competition to work. Overall a really interesting use-case of containers that couldn’t easily be done with regular bare metal, and with more difficulty (and hardware) using traditional virtual machines.

Sean Michael Kerner is a senior editor at InternetNews.com. Follow him on Twitter @TechJournalist

Recommended for you...

Best Internet Security Software
Devin Partida
Mar 23, 2022
ServiceNow Enhances the Now Platform for Hybrid Work
Jeff Burt
Sep 20, 2021
11 Tips to Build Scalable Enterprise-Grade Applications
Interesting Machine Learning Applications for Small Businesses
Internet News Logo

InternetNews is a source of industry news and intelligence for IT professionals from all branches of the technology world. InternetNews focuses on helping professionals grow their knowledge base and authority in their field with the top news and trends in Software, IT Management, Networking & Communications, and Small Business.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.