Broken-by-Design/posts/debootscrap.md

122 lines
5 KiB
Markdown
Raw Permalink Normal View History

2022-09-08 10:15:54 +00:00
---
2022-09-09 07:34:34 +00:00
title: "Building a Debian rootfs from an unprivileged user with debootstrap"
2022-09-08 10:15:54 +00:00
slug: debootscrap
authors: "Florian Maury"
description: "Faking fakechroot to build a debian rootfs from an unprivileged account, using user namespaces"
date: 2022-09-08T18:00:00+02:00
type: posts
draft: false
layout: "singletoc"
categories:
- sysadmin
tags:
- debian
- unprivileged
- security
lang: en
---
At Gatewatcher[^GW], we put efforts in making our building system reproducible
and working offline, so that we can reduce the risk of supply chain attacks.
Some efforts are also made so that our building system run with as few
2022-09-09 15:36:39 +00:00
privileges as possible.
2022-09-08 10:15:54 +00:00
[^GW]: https://www.gatewatcher.com/
One of the few things we were still running as a privileged user recently was
the build of our initial Debian root filesystem, for our base system and for our
containers.
Indeed, the official Debian Docker container from Docker Hub was not generated
in a way that we can consider secure for our need. It basically downloads a blob
from a web server, does no verification whatsoever of that blob and ships it as
the root filesystem[^debdock]. Even though the root filesystem they are using
can be rebuilt in a reproducible way, downloading the result from Internet
without verifying it against the expected hash is sort of missing the point of
2022-09-09 15:36:39 +00:00
reproducible builds. Also, debuerreotype uses `debootstrap`, which is
problematic in itself, as explained hereafter.
2022-09-08 10:15:54 +00:00
[^debdock]: https://github.com/debuerreotype/docker-debian-artifacts/blob/master/download.sh#L7
To create such root filesystem, multiple tools are provided by the Debian team,
among which `debootstrap`, and `multistrap`.
Multistrap has not been updated in many years[^multistrap], and suffers from
some limitations that were show-stoppers for us, but it is capable to create
root filesystems from an unprivileged user without hacks.
[^multistrap]: https://browse.dgit.debian.org/multistrap.git/log/
On the other hand, deboostrap is not really friendly with the idea of building a
system from an unprivileged user.
First of, there is a check to ensure we are running it with UID 0[^checkUID].
This can be bypassed in several documented ways, including using `fakeroot`,
which overloads some libc calls, using `LD_PRELOAD`. An other, less hacky, way
is to run the program in a user namespace.
[^checkUID]: https://salsa.debian.org/installer-team/debootstrap/-/blob/90747310f8722ca7e3b6a13af3f0c0e76cf7dd74/debootstrap#L605
2022-09-08 10:15:54 +00:00
Unfortunately, this is not sufficient to run `debootstrap`, since it performs
another check consisting of trying to create a "/dev/null" node[^checkNode].
This is more problematic since nodes cannot be created from a user namespace, as
this would create a easy way of escaping the namespace.
[^checkNode]: https://salsa.debian.org/installer-team/debootstrap/-/blob/90747310f8722ca7e3b6a13af3f0c0e76cf7dd74/functions#L1664
2022-09-08 10:15:54 +00:00
As it seems, though, there is a way to build an unprivileged Debian root
filesystem that is even built into deboostrap, using the installation variant
2022-09-09 07:09:08 +00:00
"fakechroot". Alternate code paths exist in deboostrap when this variant is
selected that side-step some checks, and fake some calls. This variant also adds
2022-09-08 10:15:54 +00:00
a check to ensure this variant is run only if the `fakechroot` utility is in
use. Therefore, you are expected to run debootstap as followed, as documented in
the `fakechroot` manpage:
```sh
# apt update && apt install -y debootstrap fakeroot fakechroot
$ fakechroot fakeroot debootstrap --variant=fakechroot bullseye $HOME/rootfs
```
`fakechroot` works by overloading some functions with `LD_PRELOAD`, and has some
documented limitations regarding symlinks. As it happens, these limitations
include rewrites of absolute symlinks, by prefixing them with the path of the
faked chroot. As a result, within the chroot, you will find links that are
broken when actually chrooting, such as when you would use that directory
hierarchy as a root filesystem on a container or a virtual machine.
With `fakechroot`:
```sh
$ readlink /path/to/my/chroot/usr/sbin/telinit
/path/to/my/chroot/bin/systemctl
```
Without `fakechroot` (this is what you want to see, in a normal system):
```sh
$ readlink /path/to/my/chroot/usr/sbin/telinit
/bin/systemctl
```
After some verifications, we decided that it was safe to fake the use of
`fakechroot`, while using the "fakechroot" installation variant. For this, we
set the environment variable `FAKECHROOT` to `true`, which fakechroot is
2022-09-09 15:36:39 +00:00
supposed to set and which is controlled by `debootstrap` to authorize the use of
2022-09-08 10:15:54 +00:00
the "fakechroot" variant. And it worked.
So to build a working root filesystem from an unprivileged user, we are now
doing the following:
```sh
$ podman unshare
2022-09-09 15:02:49 +00:00
# FAKECHROOT=true debootstrap --variant=fakechroot bullseye chroot/
# tar -C chroot/ --exclude=dev/* -czf ./chroot.tgz .
# exit
2022-09-08 10:15:54 +00:00
$ cat <<EOF > Containerfile
FROM scratch
ADD chroot.tgz .
CMD ["/bin/bash"]
EOF
$ podman build -f Containerfile
```
This series of commands builds a Debian container from an unprivileged user.
More work needs to be done to achieve offline reproducible builds, of course,
but none require hacks like this, thankfully.