.NET 6 is now in Ubuntu 22.04
Richard Lander
Here’s the commands to
install the .NET 6 SDK on Ubuntu 22.04:
sudo apt update
sudo apt install dotnet6
We’re also announcing
that .NET 6 is available with Chiseled Ubuntu Containers.
Our friends at Canonical have developed a new chisel approach for making ultra-small
container images. We’re very excited about it. The Chiseled Ubuntu image
is 100MB smaller than the Ubuntu images you’ve
been using until now!
Here’s the command to
pull the new ASP.NET Chiseled image:
docker pull mcr.microsoft.com/dotnet/nightly/aspnet:6.0-jammy-chiseled
We also updated
our dotnetapp and aspnetapp samples
so that you can try out .NET with Chiseled Ubuntu Containers.
These new container
images significantly improve security posture:
- Ultra-small images (reduced
size and attack surface)
- No package manager (avoids a whole
class of attacks)
- No shell (avoids a whole class
of attacks)
- Non-root (avoids a whole class
of attacks)
To top that off,
Canonical and Microsoft are committed to working together to ensure that new
.NET releases are available with new Ubuntu releases and that they work well
together. This includes security updates and secure delivery of container
images.
We’re really excited
that .NET 6 is available in Ubuntu 22.04 and that Canonical chose to work with
us as their launch partner for Chiseled Ubuntu images. This is what Canonical
had to say about the project.
“Ubuntu now has an
end-to-end story from development to production with ultra-small supported
container images, starting with the .NET platform”, said Valentin Viennot,
Product Manager at Canonical. “We think it’s a huge improvement for both our
communities; collaborating with the .NET team at Microsoft has enabled us to go
above and beyond”.
Canonical and Microsoft
Several months ago,
folks at Canonical and Microsoft started working together with the goal of
making Ubuntu an even better environment for .NET devs.
We had two main goals
in mind:
- Simplify using .NET on Ubuntu.
- Shorten the supply chain
between Canonical and Microsoft.
We’ve known for years
that many .NET devs use Ubuntu. After we got talking, it became obvious that
there was a fair bit we could do to make that experience better. Let me tell
you what we’ve delivered.
.NET in APT
You can now
install .NET 6 with APT, built
by Canonical via source-build. These
packages are available with Ubuntu 22.04 (Jammy) and later. It’s a great reason
to upgrade to Jammy!
Note: Please checkout
this advisory on using packages.microsoft.com on Ubuntu 22.04 now that .NET 6 is
included in Ubuntu.
There are multiple packages:
- dotnet6 — The .NET 6 SDK (short name).
- dotnet-sdk-6.0 —
Same as above (long name).
- aspnet-runtime-6.0 —
ASP.NET Core
- dotnet-runtime-6.0 —
.NET Runtime
I’ll show you how to
install these images using Docker (same model applies elsewhere):
rich@kamloops:~$ docker run --rm -it ubuntu:jammy
root@7d4dfca0ef55:/# apt update && apt install -y dotnet6
root@7d4dfca0ef55:/# dotnet --version
6.0.108
In case that doesn’t work,
you need the following source registered, in /etc/apt/sources.list:
deb http://archive.ubuntu.com/ubuntu/
jammy-updates universe
Canonical and
Microsoft will be working together to ensure that these packages are updated on
the monthly .NET team release schedule. This includes Microsoft sharing CVE information (descriptions
and code) with Canonical ahead of public releases. Similarly, Canonical will
share security information in the other direction.
Notes:
- We’re currently missing Arm64
builds. Those will be coming soon. Both companies are strong proponents of
Arm64.
- .NET 7 builds are not yet
available, and likely won’t be until .NET 7 GA.
- .NET SDK
workloads are not available in packages (for any Linux
distro). Also, the .NET MAUI workloads isn’t supported on Linux.
.NET in Chiseled Ubuntu Containers
You can now use .NET in Chiseled Ubuntu Containers. Chiseling
delivers the smallest container footprint while still being the Ubuntu you know
and trust. It is similar to conventional distroless, with a tool
that is customized for slicing .deb packages.
These images are 100MB smaller than the Ubuntu images we’ve
offered until now and don’t include a root user!
We’re offering three
layers of Chiseled Ubuntu container images, for Arm64 and x64, for .NET 6 and
7:
- mcr.microsoft.com/dotnet/nightly/runtime-deps:6.0-jammy-chiseled
- mcr.microsoft.com/dotnet/nightly/runtime:6.0-jammy-chiseled
- mcr.microsoft.com/dotnet/nightly/aspnet:6.0-jammy-chiseled
Note: The images will
be offered in our nightly repos while the
chiseled offering is in preview. We’ll make another announcement when they are
supported in production. It will be sometime this year, but we haven’t picked a
timeframe, since we’ve been focused on basic enablement.
Canonical is also
publishing Chiseled Ubuntu container images for .NET, that include the new APT
packages, via Docker Hub:
- https://hub.docker.com/r/ubuntu/dotnet-deps
- https://hub.docker.com/r/ubuntu/dotnet-runtime
- https://hub.docker.com/r/ubuntu/dotnet-aspnet
Let’s take a look at
the size win. All of the following sizes are uncompressed (on-disk, not
registry/wire size).
First, the runtime-deps layer.
- Ubuntu 22.04 (Jammy): 112MB
- Chiseled Ubuntu 22.04
(Jammy): 12.9MB
And on the other end
of the spectrum, the aspnet layer.
- Ubuntu 22.04 (Jammy): 213MB
- Chiseled Ubuntu 22.04
(Jammy): 104MB
That’s a truly amazing
difference! The folks at Canonical have figured out how to drop 100MB of
binaries and other content from these images. When we first started talking, we
had no idea we’d be talking about this large of a difference!
Close readers will
notice that chiseled aspnet is smaller than
the existing runtime-deps layer. That’s
shockingly good.
It’s reasonable to ask
what Alpine looks like. It’s a newer distro
designed to be super small and componentized from the start. Alpine is 9.84MB for runtime-deps:6.0-alpine and 100MB for aspnet:6.0-alpine. Those are impressive numbers, again
uncompressed. That’s the key reason why Alpine is so popular (and why we’ve
published .NET images for it for years).
Alpine is great (and
we’re also friends with those folks),
but it isn’t for everyone and every app since it uses musl,
which is a different (and incompatible) libc variant. That’s only important if your
app includes native libraries. If it doesn’t (and most .NET apps don’t), you
don’t need to worry about this detail. The .NET product itself is happy running
with either musl or glibc and
every PR on dotnet/runtime tests for both.
Putting this in
perspective, this is really great news if you use Ubuntu for development and
always wished for a small Ubuntu to deliver into production. You now have a
straightforward path from dev box to cloud without any distro-compatibility
surprises. It’s amazing (and quite surprising) to see Ubuntu in the same
ballpark as Alpine. Kudos to the Canonical folks on a great engineering
accomplishment.
It’s also worth
mentioning that Chainguard is looking at minimal container images towards a
secure future. That project is run out of the distroless GitHub
org. We’re watching that project and glad to see more interest in small and
more secure container images. We believe that minimal + non-root container
images are the future.
Like our Alpine images, we’ve
chosen not to include ICU. It would likely double the size of the
image. That means that we’ve enabled globalization invariant mode.
For some apps, that’s fine, and the size win is great. For others, it is a deal
breaker. We may need to adjust this part of the plan depending on the feedback.
We’ve documented the pattern to
add ICU into your images.
Let me demo these images
a bit to drive the point home on how (intentionally) limited these images are.
% docker run --rm mcr.microsoft.com/dotnet/nightly/runtime-deps:6.0-jammy-chiseled-amd64
docker: Error response from daemon: No command specified.
See 'docker run --help'.
Let’s try again.
% docker run --rm mcr.microsoft.com/dotnet/nightly/runtime-deps:6.0-jammy-chiseled-amd64 bash
docker: Error response from daemon: failed to create shim task: OCI runtime
create failed: runc create failed: unable to start container process: exec: "bash": executable file not found in $PATH: unknown.
Huh? What’s up? They
don’t work! That’s the point. These are appliance-like container images. They
are stripped down to the minimum. They are only intended to do what you design
them to do. That’s the aspect that makes them more secure. If this experience
is uncomfortable, you can always use the regular Ubuntu images. We’ll continue
to offer them. They are not going away.
We’re not offering a
chiseled SDK image. It wasn’t obvious that there was a strong need. In fact, a
chiseled SDK image could be hard to use for some scenarios. You can continue to
use the existing Jammy SDK image: mcr.microsoft.com/dotnet/sdk:6.0-jammy. If there is a need
for a chiseled SDK image, we’ll be happy to reconsider.
Using chiseled container images
For most apps, there
won’t be any notable difference in using these new container images, in terms
of what your Dockerfile looks like.
We made updated our
samples to use these new containers images:
I’ll show you how easy
this is with dotnetapp.
The Dockerfile is
barely different.
FROM mcr.microsoft.com/dotnet/sdk:7.0-jammy AS build
WORKDIR /source
# copy csproj and restore as distinct layers
COPY *.csproj .
RUN dotnet restore --use-current-runtime
# copy and publish app and libraries
COPY . .
RUN dotnet publish -c Release -o /app --use-current-runtime --self-contained false --no-restore
# final stage/image
FROM mcr.microsoft.com/dotnet/nightly/runtime:7.0-jammy-chiseled
WORKDIR /app
COPY --from=build /app .
ENTRYPOINT ["dotnet", "dotnetapp.dll"]
Only the final FROM statement really differs from our
standard Ubuntu Dockerfile.
I’ll now build the
sample:
rich@MacBook-Air-2 dotnetapp % pwd
/Users/rich/git/dotnet-docker/samples/dotnetapp
rich@MacBook-Air-2 dotnetapp % docker build -t dotnetapp-chiseled -f Dockerfile.chiseled .
rich@MacBook-Air-2 dotnetapp % docker images | grep dotnetapp-chiseled
dotnetapp-chiseled
latest bf7e125bd182 20 seconds ago 90.5MB
Note: I didn’t use any
.NET trimming features. Certainly, this image could be made smaller.
Let’s launch the
container:
rich@MacBook-Air-2 dotnetapp % docker run --rm dotnetapp-chiseled
42
42 ,d ,d
42 42 42
,adPPYb,42 ,adPPYba, MM42MMM 8b,dPPYba, ,adPPYba, MM42MMM
a8" `Y42 a8" "8a
42 42P' `"8a a8P_____42 42
8b 42 8b d8
42 42 42 8PP""""""" 42
"8a, ,d42 "8a, ,a8" 42, 42 42 "8b, ,aa
42,
`"8bbdP"Y8 `"YbbdP"'
"Y428 42 42 `"Ybbd8"' "Y428
.NET 7.0.0-preview.7.22375.6
Linux 5.10.104-linuxkit #1 SMP PREEMPT Thu Mar 17 17:05:54 UTC
2022
OSArchitecture: Arm64
ProcessorCount: 4
TotalAvailableMemoryBytes: 3.83 GiB
And then, let’s try to
break in:
rich@MacBook-Air-2 dotnetapp % docker run --rm --entrypoint bash dotnetapp-chiseled
docker: Error response from daemon: failed to create shim task: OCI runtime
create failed: runc create failed: unable to start container process: exec: "bash": executable file not found in $PATH: unknown.
rich@MacBook-Air-2 dotnetapp % docker run --rm --entrypoint apt dotnetapp-chiseled install -y bash curl
docker: Error response from daemon: failed to create shim task: OCI runtime
create failed: runc create failed: unable to start container process: exec: "apt": executable file not found in $PATH: unknown.
My “red team” skills
are failing me. Note that docker exec would have the
same result.
I’ll now describe
chiseled images in a bit more detail now that you’ve seen them in action.
Chiseled Ubuntu Containers
Chiseled Ubuntu
Containers are the Canonical take on the distroless concept, originally popularized by Google. With the original
implementation, a distro is stripped bare and only necessary packages are
installed. Chiseling takes this one step forward by installing only the directories and
files in each package that are necessary.
The other challenge
with the original implementation was that it wasn’t necessarily supported by
any party. Chiseled Ubuntu Containers are a first-class Canonical deliverable.
That means you can use ultra-small container images and be supported as a
Canonical customer.
Hats off to Google for
getting us all started down this path.
As stated earlier,
there is a lot of value to this approach:
- Ultra-small images (reduced size
and attack surface)
- No package manager (avoids a
whole class of attacks)
- No shell (avoids a whole class
of attacks)
Chiseled Ubuntu
Containers are currently in preview. We’ll make a separate announcement when
they are stable and supported in production.
Non-root images
We’ve configured all of the new .NET
Chiseled Ubuntu Containers with a non-root user. The
images do not include the root user or include
root-elevating commands like sudo or su. That means that it
is not possible to exercise capabilities and operations that require root.
Non-root images are an
additional security mitigation beyond removing a shell (like bash). Non-root images are logically separate and
complementary to running a daemon as rootless. Every reduction in privilege helps.
If you need access to
privileged resources, you can add the root user within your Dockerfile. You are not prevented from that, but then that’s a specific
security decision you’d be making.
Chiseled images are
appliance-like and are not general-purpose. We felt that they offered us an
opportunity to finally deliver non-root images. That’s
informing our policy going forward. Appliance-like images will be delivered as
non-root and general-purpose ones will be delivered as per the policy of the
base image (which might be configured with the root user). However, this project with
Canonical has inspired us to look at a middle-ground option, of offering non-root-capable images.
Secure supply chain
Canonical already has
secure processes in place for directly delivering Ubuntu Virtual Machine images
to Azure for customers to use. It occurred to us that Canonical could do the
same thing with the Ubuntu container base images that we use to build
Ubuntu-based .NET images (regular and Chiseled). That’s what we’re now using,
instead of pulling from Docker Hub. We now have what’s effectively a
zero-distance supply chain for all Canonical assets with known custody/provenance
throughout.
We’re doing something
similar with sharing CVE fixes. We have a shared private virtual mono repo for sharing monthly
patches. It’s also shared with Red Hat. It means we can work together on
getting the correct fixes in place at the right time in a coordinated way.
.NET container images
are not yet signed, but that’s coming relatively soon. We’re regularly working
to improve our security-focused capabilities.
Support
Canonical and
Microsoft have been working together to give you a better experience. This
includes support. You can report issues in the familiar .NET repos like dotnet/core and dotnet/runtime. If you want commercial
support, you should start with Canonical support.
Canonical is the best position to support Ubuntu packages. Canonical may
contact Microsoft to assist with resolving issues, as needed.
Security researchers
that find vulnerabilities in Canonical-provided .NET packages are still
eligible for the Microsoft .NET Bounty Program.
Microsoft continues to
maintain .NET packages in its packages.microsoft.com feed for Ubuntu
and we intend to continue that going forward. For most users, we recommend
using the dotnet6 packages that
come with Ubuntu Jammy+. That’s what I’ll be doing. It’s also the same guidance
we have for Red Hat users.
Note: Please checkout
this advisory on using packages.microsoft.com on Ubuntu 22.04 now that .NET 6 is
included in Ubuntu.
There are two main
reasons to continue to use the Microsoft packages:
- You specifically want .NET
builds from Microsoft, not any other vendor.
- The Microsoft packages target
later .NET SDK feature bands (like 6.0.4xx) while source-build tracks 6.0.1xx. That’s more relevant for Windows users, but might be
important for some Linux users.
The new packages are
available for .NET 6+ and Ubuntu 22.04+. Previous .NET and Ubuntu versions are
not supported (with the new packages). You must use the existing packages.microsoft.com feed to use .NET on earlier Ubuntu
versions. Separately, earlier .NET versions are not supported on Ubuntu 22.04
because they do not support OpenSSL v3.
What’s Next?
We have identified a
number of opportunities to make it easier for
Canonical to consume .NET source. We’re going to focus on those in
the immediate term. These improvements will also benefit other users who build
and distribute .NET from source.
We recently setup a
distro-maintainer group for .NET. Canonical is a member of that group. We have
already started discussing potential source-build improvements within
that forum. Other distros (that build .NET from source) are welcome to join.
Contact dotnet@microsoft.com for more information.
Canonical is starting
out with support for x64 and will quickly add .NET packages for Arm64. It’s an
exciting time in the industry with multiple mainline chip architectures to
support. Ubuntu and .NET both have a long history of supporting multiple
architectures.
Closing
.NET has been open
source for just over 5 years now. A partnership with Canonical was felt out of
grasp during the early days of our project on GitHub. We’ve learned a lot about
how to structure an OSS project so that it is a candidate for inclusion in a
Linux distro. This is thanks to our other partners who
have taught us a lot, particularly Fedora and Red Hat. Looking back, it is easy to see that
open source, trust, and industry relationships are even more important now than
they were when we started. We’re excited and honored to be working with
Canonical.


إرسال تعليق