How to create a jailed ssh user with Jailkit on Debian Wheezy
Version 1.0
Author: Srijan Kishore <s [dot] kishore [at] ispconfig [dot] org>
Follow howtoforge on Twitter
Last edited 25/Sep/2014
This document describes how to install and configure Jailkit in Debian Wheezy Server. Jailkit is a set of utilities to limit user accounts to specific files using chroot() and or specific commands. Setting up a chroot shell, a shell limited to some specific command, or a daemon inside a chroot jail is a lot easier and can be automated using these utilities.
Jailkit is known to be used in network security appliances from several leading IT security firms, internet servers from several large enterprise organizations, internet servers from internet service providers, as well as many smaller companies and private users that need to secure cvs, sftp, shell or daemon processes.
1 Preliminary Note
This tutorial is based on Debian 7.6 server, so you should set up a basic Debian 7.6 server installation before you continue with this tutorial. The system should have a static IP address. I use 192.168.0.100 as my IP address in this tutorial and server1.example.com as the hostname.
2 Install Jailkit
We will first download and install the Jailkit. At present time of writing this guide the latest available version of Jailkit is 2.17. I will download it and install it as follows:
cd /tmp
wget http://olivier.sessink.nl/jailkit/jailkit-2.17.tar.gz
tar xvfz jailkit-2.17.tar.gz
cd jailkit-2.17
Jailkit requires some packages before its installation, we will install them as follows:
apt-get install build-essential autoconf automake1.9 libtool flex bison debhelper binutils-gold python
Now our system is ready to install the Jailkit, install it as follows:
./debian/rules binary
cd ..
dpkg -i jailkit_2.17-1_amd64.deb
It will install the Jailkit in Debian Server, we can remove the extra packages from /tmp:
rm -rf /tmp/jailkit*
3 Jailing a user
Now we will create a user which will be jailed using Jailkit as:
adduser srijan
root@server1:~#adduser srijan
Adding user `srijan' ...
Adding new group `srijan' (1001) ...
Adding new user `srijan' (1001) with group `srijan' ...
Creating home directory `/home/srijan' ...
Copying files from `/etc/skel' ...
Enter new UNIX password: <--password
Retype new UNIX password:<--password
passwd: password updated successfully
Changing the user information for srijan
Enter the new value, or press ENTER for the default
Full Name []: <--ENTER
Room Number []:<--ENTER
Work Phone []:<--ENTER
Home Phone []:<--ENTER
Other []:<--ENTER
Is the information correct? [Y/n] <--Y
root@server1:~#
In my case I am creating the user srijan, you can use any name.
Next we will check the information about user srijan in /etc/passwd as:
egrep srijan /etc/passwdroot@server1:/tmp# egrep srijan /etc/passwd
srijan:x:1001:1001:,,,:/home/srijan:/bin/bash
root@server1:/tmp#
Next we will jail the created user. Create a directory /jail for Jail environment:
mkdir /jail
Now we will provide the Jail with some of the default programs environment as:
jk_init -v /opt/jail netutils basicshell jk_lsh openvpn ssh sftp
We can give other values also, the complete list of the Jail environment can be checked in the file
nano /etc/jailkit/jk_init.ini
Now Jail is ready, just add the user inside the environment:
jk_jailuser -m -j /jail/ srijan
Again check the values in /etc/passwd for user srijan:
egrep srijan /etc/passwdroot@server1:/tmp# egrep srijan /etc/passwd
srijan:x:1001:1001:,,,:/jail/./home/srijan:/usr/sbin/jk_chrootsh
root@server1:/tmp#
Now our user have been added in the Jailed environment. I will connect the Debian server with bash terminal with its IP 192.168.0.100:
ssh [email protected]root@server1:~$ ssh [email protected]
The authenticity of host '192.168.0.100 (192.168.0.100)' can't be established.
ECDSA key fingerprint is 3d:ca:91:67:96:39:15:b4:0f:6e:c8:2c:92:ef:25:d7.
Are you sure you want to continue connecting (yes/no)? yes
[email protected]'s password:
Linux server1 3.2.0-4-amd64 #1 SMP Debian 3.2.60-1+deb7u3 x86_64
The programs included with the Debian GNU/Linux system are free software;
the exact distribution terms for each program are described in the
individual files in /usr/share/doc/*/copyright.
Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent
permitted by applicable law.
Connection to 192.168.0.100 closed.
root@server1:~$
Connection is getting closed as the user don't have logging shell, lets add it in the configuration file for Jail:
nano /jail/etc/passwd
root:x:0:0:root:/root:/bin/bash nobody:x:65534:65534:nobody:/nonexistent:/bin/sh #srijan:x:1001:1001:,,,:/home/srijan:/usr/sbin/jk_lsh srijan:x:1001:1001:,,,:/home/srijan:/bin/bash
It will add the bash prompt for the jailed user srijan. Now again try the ssh login with srijan user and you will be able to login:
ssh [email protected]
Now check the root directory content, you will notice that it have contents like this:
ls /srijan@server1:~$ ls /
bin dev etc home lib lib64 usr
srijan@server1:~$
4 Running services and commands in Jailed environment
Jail can be used to run services in Jailed environment. Suppose we want to run any service in Jailed environment then we will use jk_chrootlaunch command for that:
jk_chrootlaunch -j /jail -u srijan -x 'service apache2 start'
Here I am starting the service of Apache, similarly you can run any service or daemon with it in Jailed environment.
Suppose we want to run a particular command in Jail environment then we will use jk_cp. Lets test it in Jailed environment when we will run cal then it shows as follows:
calsrijan@server1:~$ cal
bash: cal: command not found
srijan@server1:~$
It means Jail environment don't knows the cal command, now I will add it in Debian Server as follows:
jk_cp -v -j /jail/ /usr/bin/calroot@server1:~# jk_cp -v -j /jail/ /usr/bin/cal
Creating symlink /jail/usr/bin/cal to ncal
Copying /usr/bin/ncal to /jail/usr/bin/ncal
Creating symlink /jail/lib/x86_64-linux-gnu/libncurses.so.5 to libncurses.so.5.9
Copying /lib/x86_64-linux-gnu/libncurses.so.5.9 to /jail/lib/x86_64-linux-gnu/libncurses.so.5.9
/jail/lib/x86_64-linux-gnu/libtinfo.so.5 already exists, will not touch it
/jail/lib/x86_64-linux-gnu/libc.so.6 already exists, will not touch it
/jail/lib/x86_64-linux-gnu/libdl.so.2 already exists, will not touch it
/jail/lib64/ld-linux-x86-64.so.2 already exists, will not touch it
/jail/lib/x86_64-linux-gnu/libtinfo.so.5 already exists, will not touch it
/jail/lib/x86_64-linux-gnu/libc.so.6 already exists, will not touch it
/jail/lib/x86_64-linux-gnu/libdl.so.2 already exists, will not touch it
/jail/lib64/ld-linux-x86-64.so.2 already exists, will not touch it
root@server1:~#
Again run the cal command in Jailed environment:
calsrijan@server1:~$ cal
September 2014
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30
srijan@server1:~$
So we have added the command for the Jailed environment. Congratulations! Now we have successfully configured Jail environment in Debian Wheezy :)
5 Links
- Debian : https://www.debian.org/