Actions

Installation of Debian (based) Linux distributions in a folder (chroot)

From Whonix



Ambox warning pn.svg.png Documentation for this is incomplete. Contributions are happily considered!

Chroot Use Cases[edit]

Chroot Security[edit]

chroot is not a security feature [archive].

Examples[edit]

systemd-nspawn[edit]

Introduction[edit]

Quote Changing Roots [archive]:

  • systemd-nspawn tool which acts as chroot(1) on steroids

  • it makes use of file system and PID namespaces to boot a simple lightweight container on a file system tree.

  • It can be used almost like chroot(1), except that the isolation from the host OS is much more complete, a lot more secure and even easier to use

  • systemd-nspawn is capable of booting a complete systemd or sysvinit OS in container with a single command.

  • Booting of the container can take less than 3 seconds.

Security[edit]

Can systemd-nspawn be made a secure jail? The following quote might be outdated and/or not reflect a "hardened container". Quote systemd lead developer [archive]:

Note however that this protects the host OS only from accidental changes of its parameters. A process in the container can manually remount the file systems read-writeable and then change whatever it wants to change.

What are these issues? Related to running root vs non-root inside the container? Can these security holes nowadays be closed?

Since we are inside a VM already, can containers be used for better security?

Quote systemd-nspawn man page [archive]:

--drop-capability=

Specify one or more additional capabilities to drop for the container. This allows running the container with fewer capabilities than the default (see above).

Quote https://wiki.archlinux.org/index.php/systemd-nspawn#Creating_private_users_(unprivileged_containers) [archive]

systemd-nspawn supports unprivileged containers,

Great!

, though the containers need to be booted as root.

That could be an OK limitation?

See also:

Exit systemd-nspawn[edit]

To leave the chroot press keep holding key CTRL and press key 5 quickly 3 times within 1 second. [1]

See Also[edit]

LXC[edit]

https://wiki.archlinux.org/index.php/Linux_Containers#Enable_support_to_run_unprivileged_containers_(optional) [archive]

mmdebstrap[edit]

mmdebstrap is a tool that can be used to securely create chroots.

Using debootstrap is insecure at times such as if APT is vulnerable and the fixed package only available from security.debian.org APT repository not the regular Debian repository because it can use only 1 APT repository at a time. And security.debian.org does not include all packages created to create a chroot.

A secure alternative is mmdebstrap. [2] See also other advantages of mmdebstrap [archive].

TODO[edit]

  • xchroot [archive]: chroot for users with Xorg/X11 forwarding and automatic mounting + aufs/unionfs read only root support.

Footnotes[edit]



text=Jobs in USA
Jobs in USA


Search engines: YaCy | Qwant | ecosia | MetaGer | peekier | Whonix ™ Wiki


Follow: Twitter.png Facebook.png 1280px-Gab text logo.svg.png Iconfinder news 18421.png Rss.png Matrix logo.svg.png 1024px-Telegram 2019 Logo.svg.png Discourse logo.svg Reddit.jpg Diaspora.png Gnusocial.png Mewe.png 500px-Tumblr Wordmark.svg.png Iconfinder youtube 317714.png 200px-Minds logo.svg.png 200px-Mastodon Logotype (Simple).svg.png 200px-LinkedIn Logo 2013.svg.png

Donate: Donate Bank Wire Paypal Bitcoin accepted here Monero accepted here Contriute

Whonix donate bitcoin.png Monero donate whonix.png United Federation of Planets 1000px.png

Share: Twitter | Facebook

Please help us to improve the Whonix Wikipedia Page [archive]. Also see the feedback thread [archive].

https link onion link

This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to Conditions for Contributions to Whonix ™, then Edit! Edits are held for moderation. Policy of Whonix Website and Whonix Chat and Policy On Nonfreedom Software applies.

Copyright (C) 2012 - 2020 ENCRYPTED SUPPORT LP. Whonix ™ is a trademark. Whonix ™ is a licensee [archive] of the Open Invention Network [archive]. Unless otherwise noted, the content of this page is copyrighted and licensed under the same Freedom Software license as Whonix ™ itself. (Why?)

Whonix ™ is a derivative of and not affiliated with Debian [archive]. Debian is a registered trademark [archive] owned by Software in the Public Interest, Inc [archive].

Whonix ™ is produced independently from the Tor® [archive] anonymity software and carries no guarantee from The Tor Project [archive] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our Privacy Policy, Cookie Policy, Terms of Service, and E-Sign Consent. Whonix ™ is provided by ENCRYPTED SUPPORT LP. See Imprint, Contact.