Managing Jails

General Information

This document is an introduction to basic FreeBSD jails also called ‘fat jails’. adidas chaussures We discuss an easy jail installation process. nike air max tn soldes We will do some basic jail configuration and show you how to manage the jail environment. nike free bns gold This document wil not cover building ‘chroot jails’ in a jail.


Requirements

  1. Basic knowledge of FreeBSD
  2. Root access
  3. Read up on jails – see the references at the end of the document

Installation

Before we start: the machine which will run the jails is refered as ‘host’. air jordan 1 soldes The jails are built and configured from the host. Every individual jail runs the desired services. bottes ugg pas cher The host’s services are minimized, running a syslogd and sshd should be enough.

Jail Location

Determine where you want to install the jail(s). bottes timberland pas cher Throughout the document /usr/jails will be used. chaussures nike air max For example we will install a web server in the jail, so let us take /usr/jails/webserver1 as the location for the web server.

 # cd /usr/ # mkdir jails # cd jails # mkdir webserver1 # sysinstall 

  1. In the menu select ‘Custom’.
  2. Choose ‘2 Options’ and navigate to ‘Install Root /’. When selected, press spacebar and change ‘/’ to ‘/usr/jails/webserver1’. Press ‘q’ to quit the options menu.
  3. Go to ‘5 Distributions’ and select ‘A Minimal’.
  4. Then choose ‘6 Media’ from which you will install your base installation for the jail. adidas messi
  5. When done, select ‘7 Commit’.

Don’t visit the general configuration menu. Every option you edit in the configuration menu will be executed on your host. Exit the installation menu and return to your host’s shell.

 # cd /usr/jails/webserver1 # ls .cshrc boot libexec rescue tmp .profile dev media root usr COPYRIGHT etc mnt sbin var bin lib proc sys # 

We have to edit and create some configuration files in order to make our jail(s) work.

Host – rc.conf

 hostname="host" ifconfig_rl0="inet 10.0.0.10 netmask 255.255.255.0" ifconfig_rl0_alias0="inet 10.0.0.20 netmask 255.255.255.255" inetd_enable=”NO” # if you need inetd sevices on the host, uncomment the inetd lines #inetd_enable="YES" #inetd_flags="-wW -a 10.0.0.10" rpcbind_enable="NO" sendmail_enable="NO" sendmail_submit_enable="NO" sendmail_outbound_enable="NO" sendmail_msp_queue_enable="NO" syslogd_enable="YES" syslogd_flags="-ss" syslogd_flags="-a 10.0.0.10" syslogd_flags="-a 10.0.0.20" keymap="us.iso" sshd_enable="YES" # Jail general settings jail_set_hostname_allow=”NO” jail_enable="YES" jail_list="webserver1" jail_interface="rl0" jail_devfs_enable="YES" jail_procfs_enable="YES" # settings per jail listed in jail_list jail_webserver1_rootdir="/usr/jails/webserver1" jail_webserver1_hostname="webserver1" jail_webserver1_ip="10.0.0.20" jail_webserver1_devfs_ruleset="devfsrules_jail" 

The host’s rc.conf consists of two blocks: the config for the host and the jail. The jail’s config consists of two subcategories: the general jail config and the per jail config.

Corresponding to the sections ‘Setting up the host environment’ and ‘Configuring the jail’ of the manual page of jail(8), we have to create IP-aliases, edit the super-server daemon (In this scenario, inetd is disabled.) , disable the portmapper and disable sendmail. asics france nike air max classic bw Specifying the syslogd flags –ss disables remote logging and syslogd will not listen to any IP-address. nike air max 2017 pas cher Instead, we want syslogd to listen to specific socketaddresses through enabling the –a flag.

The next rc.conf block is about the jails. Read the manual page rc.conf(5) for all the jail options and jail(8) for their configuration and use. You have to know there are several sysctl management entries you can alter and configuration defaults aren’t listed in the provided rc.cconf. nike air max 2018 timberland discount Check out ‘/usr/share/examples/etc/defaults/rc.conf’ for a complete survey. asics kinsei The first system control line you encounter is ‘jail_set_hostname_allow=”NO”’. This option affects all jails and has to be stated before any jail is started. nike air max 90 pas cher chaussure adidas zx flux It allows or disallows jail processes changing the jail’s hostname. Buy Blade and Soul Gold ugg classic mini This affects management tools relying on the jail information in /proc. The option should be disabled like this if you are giving out root access to untrusted users in the jail.

Through the ‘jail_list’ variable, the host knows and starts the known jails. bottes ugg For example ‘jail_list=”webserver1 database dns” ‘.

Webserver1 – rc.conf

 hostname="webserver1" ifconfig_rl0="inet 10.0.0.20 netmask 255.255.255.255" defaultrouter="10.0.0.1" rpcbind_enable="NO" clear_tmp_enable="YES" sendmail_enable="YES" sshd_enable="YES" 

When you enable sshd, specify the ListenAddress in /etc/ssh/sshd_conf. The ListenAddress will be 10.0.0.20 for ‘webserver1’.

Webserver1 – resolv.conf

If your host box has already an internet connection, you can copy the host’s DNS information to webserver1.

 # cp /etc/resolv.conf /usr/jails/webserver1/etc/resolv.conf 

This should be sufficient to start the jailed environment. nike flyknit air jordan 14 retro There are more ways to execute a jail. The document’s information will keep it simple. Reboot the host system or execute on the host:

 # /bin/sh /etc/rc 

Let us see if the jail and its network are up and running by using the commands ‘jls’ (jail list) and ‘ping’. Jail ID 0 equals the host.

 # jls JID IP Address Hostname Path 1 10.0.0.20 webserver1 /usr/jails/webserver1 # ping -c 3 10.0.0.20 PING 10.0.0.20 (10.0.0.20): 56 data bytes 64 bytes from 10.0.0.20: icmp_seq=0 ttl=64 time=0.324 ms 64 bytes from 10.0.0.20: icmp_seq=1 ttl=64 time=0.222 ms 64 bytes from 10.0.0.20: icmp_seq=2 ttl=64 time=0.220 ms --- 10.0.0.20 ping statistics --- 3 packets transmitted, 3 packets received, 0% packet loss round-trip min/avg/max/stddev = 0.220/0.255/0.324/0.049 ms # 

We can ping the jail environment from the host or other machine, but when in a jail, only the tcp/ip (version 4) protocol is supported.

Jail configuration

Some basic jail configuration: creating an empty fstab, setting a root password, adding a user and setting the timezone.

When adding the first user, invite him to the wheel group. Root can’t login in the jail when logging in from the host.

The command ‘jexec’ (jail execute) is used as follows:

 jexec   

 # jexec 1 touch /etc/fstab # jexec 1 passwd # jexec 1 adduser # jexec 1 tzsetup 

At this point we can login to the jail with a non-root account and look around.

 # jexec 1 login $ su # exit $ exit # 

If you didn’t added a user who can become root trough adduser, this is an alternative method. ugg classic mini Spawn the root shell of the jail, open its group file and add the desired user to the wheel group. adidas stan smith ugg grise Exit the jail and re-login to the jail using ‘login’.

 # jexec 1 /bin/sh # ee /etc/group # exit # jexec 1 login 

To enable remote administration, edit the jail’s sshd_config to your needs and restart sshd. There will be at least one option in the sshd_config file you have to alter. The ‘ListenAddress’ has to be specified to the corresponding jail IP-address.

 # /etc/rc.d/sshd stop # ee /etc/ssh/sshd_config # /etc/rc.d/sshd start # exit 

Starting and stopping jails:

 # /etc/rc.d/jail start # /etc/rc.d/jail stop 

You can start and stop jails seperatly by specifying the jail’s name. For example:

 # /etc/rc.d/jail start webserver1 # /etc/rc.d/jail stop webserver1 


Installing a service

Let us continue and install a webserver trough the host’s ports collection. https://www.goldufo.com/bladesoul-gold louboutin pas cher timberland earthkeepers bottes Installing the ports collection in a jail is unnessecary. Checkig installed ports for known vulnarabilities is of course necessary. Buy Blade and Soul Gold chaussure de tennis asics We will mount the host’s ports against our jailed environments. Unmount the host’s /usr/ports and /usr/src them when done.

The ‘webserver1’ jail has no ports dirtectory at the moment; we have to create the directory.

 # jexec 1 mkdir /usr/ports # mount_nullfs /usr/ports /usr/jails/webserver1/usr/ports # mount_nullfs /usr/src /usr/jails/webserver1/usr/src # jexec 1 login # su # cd /usr/ports/ports-mgmt/portaudit # make install distclean # /usr/local/sbin/portaudit -Fda # cd ../../www/apache22 # make install distclean # echo 'apache22_enable="YES"' >> /etc/rc.conf 

For simplicity we add the IP-address as ServerName in the configuration file of httpd. asics gel pas cher Then we will try to fire it up.

 ee /usr/local/etc/apache22/httpd.conf ServerName 10.0.0.20 

 # /usr/local/sbin/apachectl start 

When you want to run the Apache web server, you can get following error:

 [warn] (2)No such file or directory: Failed to enable the ‘httpready’ Accept Filter 

You have to enable the accf_http module on the host, not the jailed environment. cheap ffxiv Items You can’t load kernel modules in your jail.

Add the line ‘accf_http_load=”YES”’ into the /boot/loader.conf of your host.

 # echo ‘accf_http_load=”YES” ‘ >> /boot/loader.conf 

When you check the hosts’ processes, look at the STAT column.

Comments

  1. Andrew Meyer says:

    This is great, however does this still apply to the latest release of jails in FreeBSD 10.1? Do you have a primer to install jails? Just want to make sure I get the right packages installed.

Speak Your Mind

*