[PVE-User] Container less secure than KVM?

Daejuan Jacobs daejuan at gmail.com
Mon Jun 23 20:51:15 CEST 2014

You can't encrypt the filesystem in OpenVZ as far as I know, at least not
with a standard setup as it isn't supported in the kernel. You can encrypt
files though.

If you are purchasing a VPS, you are trusting the owner of the server with
your data. As by design, they have complete control over the hardware and
host operating system. For many situations this is not an issue, businesses
looking to setup VM's for employees for one example. VPS as a service came
about as a low cost solution to dedicated servers for people who need to
run their own OS/software.

Of course, if you are root on the host OS, you should have control over
everything. If you want filesystem encryption then you should be going with
KVM. If you don't want someone to be able to delete your files, then you
need a dedicated server.

On Fri, Jun 20, 2014 at 7:46 PM, Gilberto Nunes <gilberto.nunes32 at gmail.com>

> Hold on, guys...
> I am just concerned about secure and try to initiate some discuss about
> that!
> Do not blame me!! rs
> Thanks...
> 2014-06-20 20:06 GMT-03:00 Lindsay Mathieson <lindsay.mathieson at gmail.com>
> :
>> On Fri, 20 Jun 2014 02:39:50 PM Gilberto Nunes wrote:
>> > Can you point me some way to cript or protect this VM's?
>> > Perhaps, create a cript layer or wathever will work...
>> Well you could encrypt sensitive data inside the container on.
>> Not overly familiar with containers, but I believe they use what ever
>> filesystem is setup on the host? so you can't use an encrypting file
>> system.
>> --
>> Lindsay
>> _______________________________________________
>> pve-user mailing list
>> pve-user at pve.proxmox.com
>> http://pve.proxmox.com/cgi-bin/mailman/listinfo/pve-user
> --
> Gilberto Ferreira
> _______________________________________________
> pve-user mailing list
> pve-user at pve.proxmox.com
> http://pve.proxmox.com/cgi-bin/mailman/listinfo/pve-user
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.proxmox.com/pipermail/pve-user/attachments/20140623/f03a8050/attachment.htm>

More information about the pve-user mailing list