LinuxQuestions.org
Support LQ: Use code LQ3 and save $3 on Domain Registration
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Newbie
User Name
Password
Linux - Newbie This Linux forum is for members that are new to Linux.
Just starting out and have a question? If it is not in the man pages or the how-to's this is the place!

Notices


Reply
  Search this Thread
Old 03-04-2014, 09:52 AM   #1
JoeGatz
LQ Newbie
 
Registered: Feb 2014
Posts: 1

Rep: Reputation: Disabled
Correlation between CHROOT and Crouton


I am trying to understand what purpose/function of CHROOT and how using it with Crouton will allow you to use certain Linux distros and libs.
Does CHROOT essentially create some kind of a "pseudo-symlink" between the actual root directory and [specified path]?
P.S. If someone could explain this to me like I am "a 3rd grader". I would appreciate it
 
Old 03-04-2014, 10:15 AM   #2
Soadyheid
Senior Member
 
Registered: Aug 2010
Location: Near Edinburgh, Scotland
Distribution: Cinnamon Mint 17.0 at present.
Posts: 1,167

Rep: Reputation: 201Reputation: 201Reputation: 201
Chroot allows you to change your root directory. Useful when you're trying to fix a toasted system from a live CD. You can chroot from the live CD's file system into the root directory of the failed systems hard drive. You're then running with the hard drive's filesystem.
Think of it as a stepping stone into the faulty system to allow you to access the files as normal. Gentoo uses chroot to allow you to complete your install after you've built it via a minimal system bootable CD. Does that help? No doubt some one will correct me if I'm wrong.

A crouton, on the other hand, is a cube of toasted bread which is found floating in soup. (Sorry, couldn't resist!)

Play Bonny!

 
1 members found this post helpful.
Old 03-04-2014, 04:11 PM   #3
salasi
Senior Member
 
Registered: Jul 2007
Location: Directly above centre of the earth, UK
Distribution: SuSE, plus some hopping
Posts: 4,052

Rep: Reputation: 881Reputation: 881Reputation: 881Reputation: 881Reputation: 881Reputation: 881Reputation: 881
I think that the most common use of chroot (not necessarily the only, but most common) is to define a 'false root directory' to contain a process and its accesses to data, so that the process is not allowed to do certain things.

So, imagine an example where some program is accessible to untrusted users and that it is possible that the untrusted user can somehow use the program (or, potentially, something like a shell spawned from the program) to look around the filesystem and maybe even replace files. This is undesirable, because they'll be either seeing data that no one intended to see, or changing files that no one intended them to change and that could have all sorts of implications.

Now you might point out that if you don't want people to have that kind of ability there should be some mechanism in the program that prevents it. The trouble with that argument is that, over the years, many programs have had problems in which someone has figured out some 'corner case' (or bug) in which this strict encapsulation isn't as strict as it should be.

So, how does the the 'false root' system help here? Well, if you have a false root and all the sensitive files are not under the false root, that is an impediment to the evildoer getting at them. Now, it does take some care and it might not be the most secure system (there may be some chance of breaking out of the chroot 'jail' and getting to the main filesystem), but it is another obstacle in the way.

These days, a proper virtual machine might be a more thorough approach (but might have an unacceptable overhead in many circumstances) or a lightweight VM.
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Tor traffic correlation by the NSA mesoderm Linux - Security 7 01-06-2014 10:22 AM
bash script array correlation issue tanveer Linux - General 3 12-15-2013 12:10 PM
Correlation in Splunk rajiv.patil82 Linux - Software 3 07-11-2012 01:53 PM
Correlation in C with matrix PB0711 Programming 2 01-24-2012 10:01 PM
how data correlation between snort and nessus works? jarien Linux - Security 0 11-27-2004 02:32 AM


All times are GMT -5. The time now is 09:53 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Facebook: linuxquestions Google+: linuxquestions
Open Source Consulting | Domain Registration