Chapter 23. Configuring a chroot Jail

Every server must be able to read certain local files, and some servers must be able to change at least some local files. If these powers can be warped to serve the needs of an attacker, that attacker can corrupt your system's configuration, gain more power, and ultimately gain complete control of your system. What, though, if that corrupted system is really just a subset of the real computer, and a subset with very limited abilities? This is the idea behind a chroot jail—to run a server in an environment so limited that it won't do an attacker any good if the server is compromised.

Not all servers operate well in a chroot jail, but some are designed to be used in this way. For those servers that support

Get Advanced Linux Networking now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.