Jump to content

chroot

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by 72.219.202.186 (talk) at 15:37, 9 January 2015 (Purpose of chroot and Creation). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

A chroot on Unix operating systems is an operation that changes the apparent root directory for the current running process and its children. A program that is run in such a modified environment cannot name (and therefore normally not access) files outside the designated directory tree. The term "chroot" may refer to the chroot(2) system call or the chroot(8) wrapper program. The modified environment is called a "chroot jail".

History

The chroot system call was introduced during development of Version 7 Unix in 1979, and added to BSD by Bill Joy on 18 March 1982 – 17 months before 4.2BSD was released – in order to test its installation and build system.[citation needed] An early use of the term "jail" as applied to chroot comes from Bill Cheswick creating a honeypot to monitor a cracker in 1991.[1] To make it useful for virtualization, FreeBSD expanded the concept and in its 4.0 release in 2000 introduced the jail command.[2] By 2004 this had led to the coining of the term jailbreak.[3] In 2005, Sun released Solaris Containers, described as "chroot on steroids."[4] In 2008, LXC (upon which Docker was later built) adopted the "container" terminology[5] and gained popularity in 2013 due to inclusion into Linux kernel 3.8 of user namespaces.[6]

Uses

A chroot environment can be used to create and host a separate virtualized copy of the software system. This can be useful for:

Testing and development
A test environment can be set up in the chroot for software that would otherwise be too risky to deploy on a production system.
Dependency control
Software can be developed, built and tested in a chroot populated only with its expected dependencies. This can prevent some kinds of linkage skew that can result from developers building projects with different sets of program libraries installed.
Compatibility
Legacy software or software using a different ABI must sometimes be run in a chroot because their supporting libraries or data files may otherwise clash in name or linkage with those of the host system.
Recovery
Should a system be rendered unbootable, a chroot can be used to move back into the damaged environment after bootstrapping from an alternate root file system (such as from installation media, or a Live CD).
Privilege separation
Programs are allowed to carry open file descriptors (for files, pipelines and network connections) into the chroot, which can simplify jail design by making it unnecessary to leave working files inside the chroot directory. This also simplifies the common arrangement of running the potentially vulnerable parts of a privileged program in a sandbox, in order to pre-emptively contain a security breach. Note that chroot is not necessarily enough to contain a process with root privileges.

Limitations

The chroot mechanism is not intended to defend against intentional tampering by privileged (root) users. On most systems, chroot contexts do not stack properly and chrooted programs with sufficient privileges may perform a second chroot to break out. To mitigate the risk of this security weakness, chrooted programs should relinquish root privileges as soon as practical after chrooting, or other mechanisms – such as FreeBSD Jails – should be used instead. Note that some systems, such as FreeBSD, take precautions to prevent the second chroot attack [7] however continual new features have at times led to complexity which hides holes in protection.

On systems that support device nodes on ordinary filesystems, a chrooted root user can still create device nodes and mount the file systems on them; thus, the chroot mechanism is not intended by itself to be used to block low-level access to system devices by privileged users. It is not intended to restrict the use of resources like I/O, bandwidth, disk space or CPU time. Most Unixes are not completely file system-oriented and leave potentially disruptive functionality like networking and process control available through the system call interface to a chrooted program.

At startup, programs expect to find scratch space, configuration files, device nodes and shared libraries at certain preset locations. For a chrooted program to successfully start, the chroot directory must be populated with a minimum set of these files. This can make chroot difficult to use as a general sandboxing mechanism.

Only the root user can perform a chroot. This is intended to prevent users from putting a setuid program inside a specially crafted chroot jail (for example, with a fake /etc/passwd and /etc/shadow file) that would fool it into a privilege escalation.

Some Unixes offer extensions of the chroot mechanism to address at least some of these limitations (see Implementations of operating system-level virtualization technology).

Graphical applications on chroot

It is possible to run graphical applications on a chrooted environment, using methods such as:[8][9]

  • xhost (or copy the secret from .Xauthority)
  • Nested X servers like Xnest or the more modern Xephyr (or start a real X server from inside the jail)
  • Accessing the chroot via SSH using the X11 forwarding (ssh -X) feature
  • xchroot an extended version of chroot for users and Xorg/X11 forwarding (socat/mount)
  • An X11 VNC server and connecting a VNC client outside the environment.

Notable applications

The Postfix mail transfer agent operates as a pipeline of individually chrooted helper programs.

Like 4.2BSD before it, the Debian and Ubuntu internal package-building farms use chroots extensively to catch unintentional build dependencies between packages. SUSE uses a similar method with its build program. Fedora, Red Hat, and various RPM-based distributions build all RPMs using a chroot tool such as mock.

Many FTP servers for POSIX systems use the chroot mechanism to sandbox untrusted FTP clients. This may be done by forking a process to handle an incoming connection, then chrooting the child (to avoid having to populate the chroot with libraries required for program startup).

If privilege separation is enabled, the OpenSSH daemon will chroot an unprivileged helper process into an empty directory to handle pre-authentication network traffic for each client. The daemon can also sandbox SFTP and shell sessions in a chroot (from version 4.9p1 onwards).[10]

ChromeOS can use a chroot to run a linux instance using Crouton, providing an otherwise thin OS with access to hardware resources. The security implications related in this article apply here.

Purpose of chroot and Creation

When chroot(1) (1 means see manual pages section 1) begins it runs program sh(1) by default. The kernel uses the specified disk as the root (/) which has records of files including sh(1) (files are any part of the computer the kernel knows of, file access control says if user/program can modify that record). The most important aspect of chroot is that the new process is unlimited to speak to the kernel in the same open manner as any other process that runs from another /, exactly the same. The only limit is which files are initially present (this means if "jail" has no networking libs, still networking can be done by any application in the jail containing knowlege of kernel (some segfault handlers or web browsers do contain that), if the kernel allows file access to or creation of /dev (devices) or the /dev is on the disk already. login(1) sets file access id to tells kernel whether to allow /dev file creation (note: old unix has perfect file access control and one can say that, but new kernels add pam acl etc which add complexity and thus one never knows what access is allowed for sure). Newer kernels no longer use file /dev acess to access the kernel or devices: new kernels have a plethera of interfaces each which need access control of some method. So today's "jails" really completely unlike yesterdays in many important aspects: mostly complexity. It's quite possible today jail or even orig / that (and this is why i wrote the article) after su(1) login(1) as user inside the jail, use of sh(1) will cause ld(1) .so failures (very typical) and in turn a shell spawned by user shell will be the root user shell: %99 access to everything. This is due lib failures which ran as root when chroot opened, the new use of "shadow libs" and things i cannot here explain. So where yesterday's chroot could jail perfectly, todays cannot, and might even change user id unexpectedly while running scripts in a bad way.

chroot is a highly useful tool in unix for testing "new root OS disks" and also software that may unintentionally clobber files (this assumes software is not trying to do so, that it does not mount disks which can be the / root we though was hidden, etc). With /dev/ populated the new root can mount(1) the previous one, which may well be intentional, but often it's assumed the tested application doesn't do such things. However chroot on new systems, if one reads the above, very well might BREAK more rules of protection than it ads, so be careful using them.

We read in that, to create a chroot is only to provide a directory, sh(1) in it (the default), and all files sh(1) will in turn require (such as libc, though this depends on how sh is compiled). The file list is roughly that of a "small rescue disk" or "boot disk", though some of those can be optionally omitted.

The chroot will usually need login(1) which had been used to place a physical disk record of entry (a log) which if removed the kernel would reject any requests by the user: however today this paradigm is omitted from distros and kernels, login may only change a bit in memory (protected by the processor if the kernel does things correctly), and "accounting" (log presence) is optional and not installed by default.

Finally one should note that processor/kernel security had been designed to prevent software from overheating glass transisitor Tubes mistakenly. That security is not heeded by today's kernels in MANY ways. Also, kernel security has no bearing on security of one user application "getting into" a different user application: it is only security against access to parts of the machine, which by now one should be assure is mostly non-existent these days. There had been no and there still isn't security to prevent a web browser from accessing and editor on the desktop. Although new measures against user-user access are newly in place: also new measures to defeate the new measures are along with these - and distributors simply cannot keep up with checking and configuring this, and never have. That is, to prevent a web brower from reading the editor: really a new login(1) and desktop is still required.

See also

References

  1. ^ Cheswick, Bill (1991). "An Evening with Berferd: In Which a Cracker is Lured, Endured, and Studied" (PDF). USENIX Summer Conference Proceedings, Volume 1. USENIX. San Francisco, California: The Association. p. 163. {{cite conference}}: Unknown parameter |booktitle= ignored (|book-title= suggested) (help)
  2. ^ Riondato, Matteo. "FreeBSD Handbook Chapter 15 Jails". freebsd.org. The FreeBSD Project. Retrieved 2014-08-19.
  3. ^ Peikar, Cyrus (2004-01-12). Security Warrior. O'Reilly Media. p. 304. ISBN 9780596552398. Retrieved 2014-08-19.
  4. ^ Schmidt, Klaus (2006-09-02). High Availability and Disaster Recovery: Concepts, Design, Implementation. Springer Science & Business Media. p. 186. ISBN 9783540345824. Retrieved 2014-08-21.
  5. ^ "SourceForge LXC Download Files". sourceforge.net. Retrieved 2014-08-21.
  6. ^ Rosen, Rami (2014-03-26). "Linux Containers and the Future Cloud" (PDF). Retrieved 2014-08-21.
  7. ^ http://man.freebsd.org/chroot/2
  8. ^ http://wiki.mandriva.com/en/Development/Howto/Chroot#Launch_X_Applications_inside_the_chroot
  9. ^ http://www.gentoo-wiki.info/HOWTO_startx_in_a_chroot
  10. ^ "sshd_config(5) manual page". 2008-04-05. Retrieved 2008-04-27.