Skip to main content
IBM  
Shop Support Downloads
IBM Home Products Consulting Industries News About IBM
IBM developerWorks : Security : Education - Tutorials
Securing your Web server
ZIPPDF (letter)PDF (A4)e-mail
Main menuSection menuFeedbackPreviousNext
4. Jailing your Web users
  


Chroot overview page 2 of 13


The following is an overview of the steps required to create a chroot environment (assuming you already have a Web server installed and running):

  • Create a list of all shared library dependencies the Web server uses.
  • Create unique UIDs and GIDs to run the Web server under (if not already done).
  • Create the required chroot directory structure.
  • Stop the Web service.
  • Copy all the program, configuration, and user files to the chroot tree.
  • Copy any required shared system libraries to the chroot tree.
  • Copy and edit the passwd and group files.
  • Copy the Web server configuration files to the chroot tree and edit as required. When complete, "lock down" the configuration files.
  • Edit the system startup scripts to reflect the changes made.
  • Edit the syslog daemon to reflect the changes made.
  • Restart the Web service and test the chroot environment.

The balance of this section details how to implement the above tasks.


Main menuSection menuFeedbackPreviousNext
Privacy Legal Contact