Re: Question regarding crunchgen(1) binaries
- In reply to: Shawn Webb : "Question regarding crunchgen(1) binaries"
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Mon, 15 Apr 2024 00:06:16 UTC
On Sun, Apr 14, 2024, 5:43 PM Shawn Webb <shawn.webb@hardenedbsd.org> wrote: > Hey FreeBSD Hackers, > > Note: I originally posted this to the HardenedBSD users mailing list. > I'm posting to freebsd-hackers@ to hopefully learn from a wider > audience. > > I wanted to ping the HardenedBSD community, asking about the > usefulness of crunchgen(1)-built applications in 2024. > For FreeBSD they are quite useful still. The HardenedBSD community can make up its own mind. From the crunchgen(1) manual page: > > > The main reason to crunch programs together is for fitting as many > > programs as possible onto an installation or system recovery floppy. > Floppy is antiquated. /resur hasn't fit on a floppy since FreeBSD 3 or so. Yet, it's still useful to have a tiny ramdisk that's either recovery or simple servers only. The binaries in /rescue are built with crunchgen. It seems that > crunchgen-built applications are not (currently) compatible with a > libc built with LTO due to the recent CSU and libc changes. > PR? Seems is aweful vague. The size of the binaries in /rescue on HardenedBSD 15-CURRENT/amd64 > are 17MB in size. That application size alone makes it impossible to > build a "system recovery floppy". Additionally, floppy drives aren't > all too common on the amd64, arm64, and riscv64 systems HardenedBSD > targets. > Don't take floppy litterally here. Control Flow Integrity (CFI) is a compiler-based exploit mitigation > that we apply to applications in HardenedBSD 15-CURRENT and 14-STABLE. > In order to apply CFI to applications, application code must be built > with Link Time Optimization (LTO). > > Over the past few years, I've slowly been working on applying CFI to > shared objects (aka, Cross-DSO CFI). This requires building library > code with LTO as well. > > It seems that with the recent changes to the CSU and libc, the > crunchgen(1) built tool does not produce workable applications when > libc is built with LTO. With libc having such a huge surface area, it > would be prudent to apply Cross-DSO CFI to it. > PR? This presents two possible solutions: > > 1. Enhance crunchgen(1) to support libc built with LTO. > 2. Kick crunchgen(1) to the curb. > 3. Other ideas from the community are possible. > > Does anyone find crunchgen(1) to be truly useful in 2024? If we kick > crunchgen(1) to the curb, we need to modify the build system for > /rescue binaries. > > My own preference would indeed to rid ourselves of crunchgen(1) so > that we can progress towards applying Cross-DSO CFI and LTO to libc. > /rescue is still the last line of defence against botched libc updates. We use it for rare cases where /usr isn't mounted yet and moving binaries is too hard in rc. Crunchgen'd binaries make the cost trivial. Plus, I have several appliances that are a RAM disk with one crunchgen binary. It makes deployment easy, but I know I'm stongly opposed to kicking crunchgen to the curb. It's still quite useful and the reasons proffered are vague and seem little more than LTO bugs... So I'm for (3) fixing LTO to not suck. The attack mitigation is a good feature, but it's not worth killing resue over... But my comments are explicitly in a FreeBSD context. Warner Thanks, > > -- > Shawn Webb > Cofounder / Security Engineer > HardenedBSD > > Tor-ified Signal: +1 303-901-1600 / shawn_webb_opsec.50 > > https://git.hardenedbsd.org/hardenedbsd/pubkeys/-/raw/master/Shawn_Webb/03A4CBEBB82EA5A67D9F3853FF2E67A277F8E1FA.pub.asc >