CURL在PHP chroot的环境中

在Mac OSX的chrootPHP环境下运行时,如何findCurl需要哪些文件或套接字?

我最近通过chrooting PHP保护了我的网站,但是现在通过它的API每次调用Amazon S3都失败了,错误消息是:

Resource id #43; cURL error: Couldn't resolve host 's3.amazonaws.com' 

从非chroot命令行调用时,相同的代码工作正常,所以大概是一些需要由CURL打开的文件,无法打开。

如何确定哪些文件试图打开,以便将它们映射到chrooted的directoy中?

有了Andrei的build议,我使用strace(或者相当于mac的mac地址)来获得一些debugging输出。

这是一个chroot的请求,不起作用。

 lstat64("/lib/amazonWS/lib\0", 0x7FFF5FBF97D0, 0x26) = 0 0 lstat64("/lib/amazonWS\0", 0x7FFF5FBF9630, 0x182) = 0 0 open("/lib/amazonWS/lib/requestcore/requestcore.class.php\0", 0x0, 0x1B6) = 5 0 fstat64(0x5, 0x100A9F448, 0x8) = 0 0 fstat64(0x5, 0x100A9F448, 0x90) = 0 0 fstat64(0x5, 0x100A9F448, 0x1001B1FE4) = 0 0 mmap(0x0, 0x72D1, 0x1, 0x1, 0x5, 0xFFFFFF8016E89160) = 0x3BF0000 0 stat64("/lib/amazonWS/lib/requestcore/requestcore.class.php\0", 0x10621CD68, 0x10621C847) = 0 0 munmap(0x103BF0000, 0x72D1) = 0 0 close(0x5) = 0 0 setitimer(0x2, 0x7FFF5FBFBCE0, 0x0) = 0 0 kqueue(0x7FFF5FBFB000, 0x0, 0x50) = 5 0 kevent(0x5, 0x7FFF5FBFB000, 0x1) = 0 0 socket(0x1, 0x1, 0x0) = 6 0 setsockopt(0x6, 0xFFFF, 0x1022) = 0 0 connect_nocancel(0x6, 0x7FFF5FBFADD0, 0x6A) = -1 Err#2 close_nocancel(0x6) = 0 0 close_nocancel(0x5) = 0 0 kqueue(0x7FFF5FBFB000, 0x0, 0x50) = 5 0 kevent(0x5, 0x7FFF5FBFB000, 0x1) = 0 0 socket(0x1, 0x1, 0x0) = 6 0 setsockopt(0x6, 0xFFFF, 0x1022) = 0 0 connect_nocancel(0x6, 0x7FFF5FBFADD0, 0x6A) = -1 Err#2 close_nocancel(0x6) = 0 0 close_nocancel(0x5) = 0 0 open_nocancel(".\0", 0x0, 0x0) = 5 0 fstat64(0x5, 0x7FFF5FBFBA80, 0x0) = 0 0 fcntl_nocancel(0x5, 0x32, 0x7FFF5FBFBCB0) = 0 0 close_nocancel(0x5) = 0 0 stat64("/basereality\0", 0x7FFF5FBFB9F0, 0x0) = 0 0 lstat64("/basereality/../BaseReality/html/50x.html\0", 0x7FFF5FBFB730, 0x23D) = 0 0 

这是一个 chrooted和工作的请求:

  1806/0x1dd3: 149524 5 3 open("/documents/projects/intahwebz/intahwebz/lib/amazonWS/lib/requestcore/requestcore.class.php\0", 0x0, 0x1B6) = 5 0 1806/0x1dd3: 149525 3 0 fstat64(0x5, 0x100A9F578, 0x8) = 0 0 1806/0x1dd3: 149527 2 0 fstat64(0x5, 0x100A9F578, 0x90) = 0 0 1806/0x1dd3: 149528 2 0 fstat64(0x5, 0x100A9F578, 0x1001B1FE4) = 0 0 1806/0x1dd3: 149531 5 2 mmap(0x0, 0x72D1, 0x1, 0x1, 0x5, 0x1F) = 0x3BF0000 0 1806/0x1dd3: 149535 4 2 stat64("/documents/projects/intahwebz/intahwebz/lib/amazonWS/lib/requestcore/requestcore.class.php\0", 0x1061966D0, 0x106196057) = 0 0 1806/0x1dd3: 149565 6 3 munmap(0x103BF0000, 0x72D1) = 0 0 1806/0x1dd3: 149568 4 2 close(0x5) = 0 0 1806/0x1dd3: 149661 4 1 setitimer(0x2, 0x7FFF5FBFBCE0, 0x0) = 0 0 1806/0x1dd3: 149767 90 2 kqueue(0x7FFF5FBFB000, 0x0, 0x50) = 5 0 1806/0x1dd3: 149770 4 1 kevent(0x5, 0x7FFF5FBFB000, 0x1) = 0 0 1806/0x1dd3: 149782 12 8 socketpair(0x1, 0x1, 0x0) = 0 0 1806/0x1dd3: 149792 12 9 sendto_nocancel(0x6, 0x105D8FCF0, 0x3A) = 58 0 1806/0x1dd3: 149796 7 3 sendmsg_nocancel(0x6, 0x7FFF5FBFAD30, 0x0) = 1 0 1806/0x1dd3: 149797 4 0 close_nocancel(0x9) = 0 0 1806/0x1dd3: 149802 45 4 recvfrom_nocancel(0x7, 0x7FFF5FBFAD7C, 0x4) = 4 0 1806/0x1dd3: 149806 5 2 close_nocancel(0x7) = 0 0 1806/0x1dd3: 149814 6 3 socketpair(0x1, 0x1, 0x0) = 0 0 1806/0x1dd3: 149816 4 1 sendto_nocancel(0x6, 0x105D8FCF0, 0x3A) = 58 0 1806/0x1dd3: 149818 5 2 sendmsg_nocancel(0x6, 0x7FFF5FBFAD30, 0x0) = 1 0 1806/0x1dd3: 149819 3 0 close_nocancel(0x9) = 0 0 1806/0x1dd3: 149822 215 2 recvfrom_nocancel(0x7, 0x7FFF5FBFAD7C, 0x4) = 4 0 1806/0x1dd3: 149840 20 17 close_nocancel(0x7) = 0 0 1806/0x1dd3: 149843 4 1 kevent(0x5, 0x7FFF5FBFB000, 0x1) = 0 0 1806/0x1dd3: 149844 3 1 kevent(0x5, 0x0, 0x0) = 1 0 1806/0x1dd3: 149846 2 0 kevent(0x5, 0x0, 0x0) = 1 0 1806/0x1dd3: 149848 5 2 recvfrom_nocancel(0x6, 0x7FFF5FBFAE30, 0x1C) = 28 0 1806/0x1dd3: 149851 5 1 recvfrom_nocancel(0x6, 0x105D8FCF0, 0x40) = 64 0 1806/0x1dd3: 149856 8 3 select_nocancel(0x7, 0x7FFF5FBFADB0, 0x0) = 1 0 1806/0x1dd3: 149861 3 1 kevent(0x5, 0x7FFF5FBFA860, 0x1) = 0 0 1806/0x1dd3: 149863 4 1 recvfrom_nocancel(0x6, 0x7FFF5FBFAE30, 0x1C) = 28 0 1806/0x1dd3: 149864 3 1 recvfrom_nocancel(0x6, 0x105D85990, 0x42) = 66 0 1806/0x1dd3: 149867 4 1 select_nocancel(0x7, 0x7FFF5FBFADB0, 0x0) = 0 0 1806/0x1dd3: 149869 2 0 kevent(0x5, 0x7FFF5FBFA860, 0x1) = 0 0 1806/0x1dd3: 149871 3 1 kevent(0x5, 0x0, 0x0) = 1 0 1806/0x1dd3: 149872 2 0 kevent(0x5, 0x0, 0x0) = 1 0 1806/0x1dd3: 149873 2 0 kevent(0x5, 0x0, 0x0) = 1 0 1806/0x1dd3: 149874 2 0 kevent(0x5, 0x0, 0x0) = 1 0 1806/0x1dd3: 149876 4 1 recvfrom_nocancel(0x6, 0x7FFF5FBFAE30, 0x1C) = 28 0 1806/0x1dd3: 149877 4 0 recvfrom_nocancel(0x6, 0x105D859E0, 0x40) = 64 0 1806/0x1dd3: 149879 3 1 select_nocancel(0x7, 0x7FFF5FBFADB0, 0x0) = 1 0 1806/0x1dd3: 149881 2 0 kevent(0x5, 0x7FFF5FBFA860, 0x1) = 0 0 1806/0x1dd3: 149883 3 0 recvfrom_nocancel(0x6, 0x7FFF5FBFAE30, 0x1C) = 28 0 1806/0x1dd3: 149884 3 0 recvfrom_nocancel(0x6, 0x105D85A20, 0x42) = 66 0 1806/0x1dd3: 149886 3 1 select_nocancel(0x7, 0x7FFF5FBFADB0, 0x0) = 0 0 1806/0x1dd3: 149888 2 0 kevent(0x5, 0x7FFF5FBFA860, 0x1) = 0 0 1806/0x1dd3: 149889 2 0 kevent(0x5, 0x0, 0x0) = 1 0 1806/0x1dd3: 149890 2 0 kevent(0x5, 0x0, 0x0) = 0 0 1806/0x1dd3: 149900 389953 9 kevent(0x5, 0x0, 0x0) = 1 0 1806/0x1dd3: 149904 60 1 kevent(0x5, 0x0, 0x0) = 1 0 1806/0x1dd3: 149909 7 3 recvfrom_nocancel(0x6, 0x7FFF5FBFAE30, 0x1C) = 28 0 1806/0x1dd3: 149913 7 2 recvfrom_nocancel(0x6, 0x105D8FD10, 0x2E) = 46 0 1806/0x1dd3: 149921 9 4 select_nocancel(0x7, 0x7FFF5FBFADB0, 0x0) = 0 0 1806/0x1dd3: 149928 5 1 kevent(0x5, 0x7FFF5FBFA860, 0x1) = 0 0 1806/0x1dd3: 149932 3 1 kevent(0x5, 0x0, 0x0) = 1 0 1806/0x1dd3: 149932 2 0 kevent(0x5, 0x0, 0x0) = 0 0 1806/0x1dd3: 149945 439745 12 kevent(0x5, 0x0, 0x0) = 1 0 1806/0x1dd3: 149952 13 3 kevent(0x5, 0x0, 0x0) = 1 0 1806/0x1dd3: 149961 15 6 recvfrom_nocancel(0x6, 0x7FFF5FBFAE30, 0x1C) = 28 0 1806/0x1dd3: 149969 11 4 recvfrom_nocancel(0x6, 0x105D8FD10, 0x2A) = 42 0 1806/0x1dd3: 149981 16 8 select_nocancel(0x7, 0x7FFF5FBFADB0, 0x0) = 0 0 1806/0x1dd3: 149987 9 3 kevent(0x5, 0x7FFF5FBFA860, 0x1) = 0 0 1806/0x1dd3: 150002 19 9 sendto_nocancel(0x6, 0x105D8FCF0, 0x1C) = 28 0 1806/0x1dd3: 150011 12 5 sendto_nocancel(0x6, 0x105D8FCF0, 0x1C) = 28 0 1806/0x1dd3: 150025 22 10 close_nocancel(0x5) = 0 0 1806/0x1dd3: 150095 26 18 socket(0x2, 0x1, 0x6) = 5 0 1806/0x1dd3: 150109 12 4 setsockopt(0x5, 0xFFFF, 0x1022) = 0 0 1806/0x1dd3: 150113 9 2 fcntl(0x5, 0x3, 0x0) = 2 0 1806/0x1dd3: 150117 7 2 fcntl(0x5, 0x4, 0x6) = 0 0 1806/0x1dd3: 150191 81 73 connect(0x5, 0x7FFF5FBFB9F0, 0x10) = -1 Err#36 1806/0x1dd3: 150217 689426 21 select(0x6, 0x7FFF5FBFB730, 0x7FFF5FBFB6B0, 0x7FFF5FBFB630, 0x7FFF5FBFB7D0) = 1 0 1806/0x1dd3: 150226 72 2 getsockopt(0x5, 0xFFFF, 0x1007) = 0 0 1806/0x1dd3: 150230 6 2 getpeername(0x5, 0x7FFF5FBFB780, 0x7FFF5FBFB6FC) = 0 0 1806/0x1dd3: 150232 4 1 getsockname(0x5, 0x7FFF5FBFB700, 0x7FFF5FBFB6FC) = 0 0 1806/0x1dd3: 150332 23 17 open_nocancel("/opt/local/share/curl/curl-ca-bundle.crt\0", 0x0, 0x1B6) = 7 0 1806/0x1dd3: 150339 6 2 fstat64(0x7, 0x7FFF5FBFB440, 0x7FFF5FBFB50C) = 0 0 1806/0x1dd3: 150350 14 9 read_nocancel(0x7, "##\n## lib/ca-bundle.crt -- Bundle of CA Root Certificates\n##\n## Certificate data from Mozilla as of: Thu Nov 22 00:12:21 2012\n##\n## This is a bundle of X.509 certificates of public Certificate Authorities\n## (CA). These were automatically extracted from Mo", 0x1000) = 4096 0 

所以它看起来不是一个直接的文件访问失败的过程,但套接字发送。 我正在按照一些说明尝试设置/ dev / urandom和其他非文件path到chroot环境中,但是有没有什么方法可以知道什么套接字socketpair(0x1, 0x1, 0x0)而不是在工作黑暗?

更新2

这是OSX上的一个已知问题,在chroot中进行DNS查询: https : //lists.macosforge.org/pipermail/macports-dev/2011-April/014565.html

显然我需要在/ path / to / chroot / var / run / mDNSResponder上运行一个mDNSResponder服务

可能是DNS问题,检查你的chroot环境下是否有正确的resolv.conf。

所以,显然在OSX上,所有对gethostbyname系统调用都是通过在/ var / run / mDNSResponder中作为套接字运行的mDNSResponder服务定向的,这与DNS请求仅通过诸如resolv.conf之类的文件发送的Linux平台不同。

mDNSResponder在chroot的环境中不可用,因此所有的DNS查找都会失败。

理论上可以创build一个在/ chroot / var / run / mDNSResponder套接字上侦听的重复mDNSResponder服务。 然而,似乎没有人真正做到这一点。

更容易做的是设置一个代理服务,例如在本地主机上运行的Squidman ,然后通过它进行所有的HTTP请求。

另外要注意的是,在mknod的chroot里面创build你自己的dev / random和dev / urandom似乎没有用,因为它们没有随机性,代理请求将失败。 相反,你应该把它们与sudo ln -s /dev/urandom /chroot/dev/urandom链接起来