I want to use use docker in "rootless mode". As I understand it, if a container (or the daemon itself) is compromised, then the code that breaks out into the host can only do damage limited to the access rights of the user running the docker daemon (my user account).
But on a VPS (especially one controlled by automation, e.g. ansible), it is common to have the user account in the sudo
group, and for it to have passwordless sudo (as specified in /etc/sudoers
).
Are these contradictory concepts? Is rootless mode still useful, given that malware breaking out into the host (and thus my user account) will have passwordless sudo rights?