Secure chroot Environment under GNU/Linux

Zámbó Marcell <lilo@andrews.hu>

Andrews IT Engeneering


The aim of the lecture is introduction to a relatively easy-to-use standard UNIX tool which can be used to substantially increase a given system's security.


The lecture starts with a definition of chroot, demonstrating its common interpretations and shows the relationship between these interpretations, followed by a short historical overview of the usage of the chroot command.


The majority of the lecture will be about the practical usage of chroot, starting with basic operation, then moving on toward details of more advanced setup and maintenance. Other chroot related tools will be discussed, too.


In the lecture, you will see a simple example of setting up and running chroot. You will also receive information about the main advantages (and disadvantages) of using chroot. In particular, practical issues that cannot be prevented or worked around using chroot will be specifically addressed along with practical suggestions as to how they can be solved using other tools.


Finally, you will be introduced to a list of common chroot usage scenarios.