Andrea Venturoli wrote:
Hello.
Plase forgive the long post and the amount of questions, but I'm new to
jails and I'd like to be sure of what I'm doing before deploying more
than a test one.
Right now I need to run a commercial Java app, which, ideally, I would
forbid to access files outside its directory.
This might be done by simple chrooting it, but I read a jail is a better
solution, so I started with ezjails.
First of all, I'm wondering whether it would be possible/useful to use
chroot even inside that jail. Any opinions?
Possible yes, useful not at all.
Second question: from inside the jail I can access all services on
localhost (eg. telnet localhost pop3, where a pop3 server is running on
the host). Can this be avoided, e.g. with ipfw?
Ideally, since this jail will run only one deamon and it will be
accessed through Apache mod_proxy from the host, I'll just need inbound
access to its port and outbound access to smtp and web proxy on the host
system. No direct access from/to other hosts.
Is this possible?
Firewall in a jail will not work. Only the host firewall has access to
the network.
Next... ezjail's author suggests I have a copy of the port tree just for
the jails and, furthermore, a repository for distfiles for every jail.
Since this would waste a lot of space, I already used a single distfile
repository, but I'm also wondering whether it would be a bad idea to use
the host's port tree. I know lot of people do this and, keeping it tidy
with portsclean -CD, I wonder if it really would be a security risk in
my case.
This is overkill. I single ports tree on the host is fine. Matter of
fact I use packages for everything accept for php which I have to
compile in apache module. I even pre-install all of php's dependents as
packages before doing "make install" on the php port. As far as
portsclean goes its only for the paranoid.
Finally (for now :): I usually install portaudit and receive every day a
report about vulnerabilities in the host system's installed ports. What
about jails? Should I install portaudit there too and let them flood me
with reports? Is there a way to let the host's portaudit check jails too?
If you dont have full ports tree in the jail then no need for portaudit
in the jail.
I'm sure I'll have other questions in some days...
Thanks in advance for now to anyone who will answer.
Best practices is not to create a jail environment by hand as documented
in the Freebsd handbook. The port utility qjail simplifies and automates
the process to the point where you dont even have to know about the jail
command. http://qjail.sourceforge.net/ use the port version for 8.x & 9.0
bye
av.
_______________________________________________
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "freebsd-questions-unsubscr...@freebsd.org"