Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Chroot
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
==History== The chroot system call was introduced during development of [[Version 7 Unix]] in 1979. One source suggests that [[Bill Joy]] added it on 18 March 1982 – 17 months before [[Berkeley Software Distribution|4.2BSD]] was released – in order to test its installation and build system.<ref>{{Cite web|url=https://docs.freebsd.org/44doc/papers/jail/jail-9.html|title=jail, section 9.|website=docs.freebsd.org|access-date=2016-03-14|archive-date=2017-01-05|archive-url=https://web.archive.org/web/20170105092247/https://docs.freebsd.org/44doc/papers/jail/jail-9.html|url-status=live}}</ref> All versions of BSD that had a kernel have chroot(2).<ref>{{Cite web|url=https://bsdimp.blogspot.com/2020/06/whither-chroot.html|title=Warner's Random Hacking Blog: Whither chroot?|first=Warner|last=Losh|date=February 2, 2000|access-date=June 28, 2020|archive-date=June 28, 2020|archive-url=https://web.archive.org/web/20200628214616/http://bsdimp.blogspot.com/2020/06/whither-chroot.html|url-status=live}}</ref><ref>{{Cite web|url=https://blog.dionresearch.com/2020/05/data-infrastructures-for-rest-of-us-iii.html|title=Data Infrastructures for the rest of us - III - software|date=17 May 2020 |access-date=2020-06-28|archive-date=2020-06-30|archive-url=https://web.archive.org/web/20200630201639/https://blog.dionresearch.com/2020/05/data-infrastructures-for-rest-of-us-iii.html|url-status=live}}</ref> An early use of the term "jail" as applied to chroot comes from [[William Cheswick|Bill Cheswick]] creating a [[Honeypot (computing)|honeypot]] to monitor a [[Hacker (computer security)|hacker]] in 1991.<ref>{{cite conference |url=https://www.cheswick.com/ches/papers/berferd.pdf |title=An Evening with Berferd: In Which a Cracker is Lured, Endured, and Studied |last1=Cheswick |first1=Bill |author-link1=William Cheswick |date=1991 |conference=[[USENIX]] |publisher=The Association |book-title=USENIX Summer Conference Proceedings, Volume 1 |pages=163 |location=San Francisco, California |access-date=2018-06-09 |archive-date=2018-11-05 |archive-url=https://web.archive.org/web/20181105012101/http://www.cheswick.com/ches/papers/berferd.pdf |url-status=live }}</ref> The first article about a jailbreak has been discussed on the security column of SunWorld Online which is written by Carole Fennelly; the August 1999 and January 1999 editions cover most of the chroot() topics.<ref>{{cite web|last1=Carole|first1=Fennelly|title=Summertime potluck|url=http://sunsite.uakom.sk/sunworldonline/swol-08-1999/swol-08-security.html|website=SunWorld Online|publisher=Carole Fennelly|archive-url=https://web.archive.org/web/20210928155456/http://sunsite.uakom.sk/sunworldonline/swol-08-1999/swol-08-security.html|archive-date=September 28, 2021|url-status=live}}</ref> To make it useful for [[Operating system–level virtualization|virtualization]], [[FreeBSD]] expanded the concept and in its 4.0 release in 2000 introduced the [[FreeBSD jail|jail]] command.<ref>{{cite web |url=http://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/jails.html |title=FreeBSD Handbook "Jails" Chapter |last1=Riondato |first1=Matteo |website=freebsd.org |publisher=The FreeBSD Project |access-date=2018-10-30 |archive-date=2014-08-15 |archive-url=https://web.archive.org/web/20140815023159/http://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/jails.html |url-status=live }}</ref> By 2002, an article written by Nicolas Boiteux described how to create a jail on Linux.<ref>{{cite web|last1=Nicolas|first1=Boiteux|title=chroot shell|url=http://membres.lycos.fr:80/code34/howtochroot1a/|website=lycos.fr|publisher=Nicolas Boiteux|archive-url=https://web.archive.org/web/20021014060228/http://membres.lycos.fr/code34/howtochroot1a/|access-date=24 March 2018|archive-date=2002-10-14|url-status=dead}}</ref> By 2003, first internet microservices providers with Linux jails provide SAAS/PAAS (shell containers, proxy, ircd, bots, ...) services billed for consumption into the jail by usage.<ref>{{cite web|title=Girafon|url=http://girafon.org:80/index.php?page=Girafon-hebergement-eggdrop-bot-ircd-24-pids-shell-linux-pour-un-paiement-allopass|website=girafon.org|publisher=girafon|archive-url=https://web.archive.org/web/20040612194051/http://girafon.org/index.php?page=Girafon-hebergement-eggdrop-bot-ircd-24-pids-shell-linux-pour-un-paiement-allopass|access-date=24 March 2018|archive-date=2004-06-12|url-status=dead}}</ref> By 2005, [[Sun Microsystems|Sun]] released [[Solaris Containers]] (also known as Solaris Zones), described as "chroot on steroids."<ref>{{cite book |last=Schmidt |first=Klaus |date=2006-09-02 |title=High Availability and Disaster Recovery: Concepts, Design, Implementation |url=https://books.google.com/books?id=adU_AAAAQBAJ&q=Solaris+Containers+chroot&pg=PA186 |publisher=Springer Science & Business Media |page=186 |isbn=9783540345824 |access-date=2014-08-21 |archive-date=2023-02-20 |archive-url=https://web.archive.org/web/20230220021312/https://books.google.com/books?id=adU_AAAAQBAJ&q=Solaris+Containers+chroot&pg=PA186 |url-status=live }}</ref> By 2008, [[LXC]] (upon which [[Docker (software)|Docker]] was later built) adopted the "container" terminology<ref>{{cite web |url=http://sourceforge.net/projects/lxc/files/lxc/ |title=SourceForge LXC Download Files |author=<!--Staff writer(s); no by-line.--> |website=sourceforge.net |access-date=2014-08-21 |archive-date=2014-08-19 |archive-url=https://web.archive.org/web/20140819223537/http://sourceforge.net/projects/lxc/files/lxc/ |url-status=live }}</ref> and gained popularity in 2013 due to inclusion into [[Linux kernel]] 3.8 of [[Linux namespaces|user namespaces]].<ref>{{cite web |url=http://www.haifux.org/lectures/320/netLec8_final.pdf |title=Linux Containers and the Future Cloud |last1=Rosen |first1=Rami |date=2014-03-26 |access-date=2014-08-21 |archive-date=2016-04-18 |archive-url=https://web.archive.org/web/20160418204630/http://www.haifux.org/lectures/320/netLec8_final.pdf |url-status=live }}</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)