SoylentNews
SoylentNews is people
https://soylentnews.org/

Title    FreeBSD Jails – Deep Dive into the Beginning of FreeBSD Containers
Date    Saturday March 06 2021, @04:52AM
Author    martyb
Topic   
from the Do-not-pass-Go,-Do-not-collect-$200 dept.
https://soylentnews.org/article.pl?sid=21/03/06/0129234

canopic jug writes:

Klara Systems has an article with a deep dive into the origins of FreeBSD jails. These ideas have been around for many decades and taken form in several stages and finally became part of FreeBSD over 20 years ago. FreeBSD jails share the main system's kernel and are therefore a relatively light weight means for userspace isolation, compared to "containers". Within the jail, the environment appears as a normal system and processes within the jail can not see upward into the host or laterally into other jails.

In the late 1990s, [Poul-Henning] Kamp was contacted by a man from South Carolina named Derrick T. Woolworth. Woolworth had a problem and was looking for a solution. He ran a web hosting company named R&D Associates Inc and he “had this idea for running multiple different versions of Apache and MySQL on the same server”. Woolworth “complained about the fact that different customers in his webhotel needed different versions of apache, mysql, perl etc, and that this forced him to run many machines, each almost idle, just for these different software loads.”

Woolworth offered to pay for the development of such a feature. “The deal was that he would pay for the development and then after one year I would commit them to FreeBSD.” With that Jails were born. After Woolworth’s year of exclusivity expired, Jails were included in FreeBSD 4.

(Interestingly, the first use of jail in the computer world was in 1991. An AT&T researcher named Bill Cheswick created what he called a “chroot ‘Jail’ ” to watch a hacker trying to get into their systems.)

Jails allow “administrators to partition a FreeBSD computer system into several independent, smaller systems – called “jails” – with the ability to assign an IP address for each system and configuration.” Jails is a method for giving “permission to access certain isolated areas of the operating system. Other jails remain completely untouched. Almost the entire isolation magic occurs at the kernel level; users only ever see the components they are supposed to see.”

As Kamp explains it, “Jails is like a one-way mirror.” He said further, “This means that an unjailed process can see all the jailed processes and, subject to UNIX access controls, send them signals, attach debuggers to them and so on. But the jailed processes cannot ‘see’ out of their jails, neither into other jails, nor into the unjailed part of the system.”

chroot, the progenitor to jails, probably first turned up sometime between 1975 and 1979 in 2BSD.

Previously:
(2018) FreeBSD Celebrates 25th Anniversary, Tuesday, June 19th
(2016) FreeBSD Devs Ponder Changes to Security Processes
(2016) Beat This: Server Retired After 18 Years and 10 Months
(2014) How to Avoid Systemd?


Original Submission

Links

  1. "canopic jug" - https://soylentnews.org/~canopic+jug/
  2. "article with a deep dive into the origins of FreeBSD jails" - https://klarasystems.com/articles/freebsd-jails-the-beginning-of-freebsd-containers/
  3. "FreeBSD Celebrates 25th Anniversary, Tuesday, June 19th" - https://soylentnews.org/article.pl?sid=18/06/19/1237234
  4. "FreeBSD Devs Ponder Changes to Security Processes" - https://soylentnews.org/article.pl?sid=16/08/11/2055221
  5. "Beat This: Server Retired After 18 Years and 10 Months" - https://soylentnews.org/article.pl?sid=16/01/15/0354217
  6. "How to Avoid Systemd?" - https://soylentnews.org/article.pl?sid=14/02/26/0314214
  7. "Original Submission" - https://soylentnews.org/submit.pl?op=viewsub&subid=47817

© Copyright 2024 - SoylentNews, All Rights Reserved

printed from SoylentNews, FreeBSD Jails – Deep Dive into the Beginning of FreeBSD Containers on 2024-04-13 10:06:44