text stringlengths 0 1.99k |
|---|
exercise to devise a way to limit the viability of exploitation without |
having to rewrite 50+ years of software? And while we're at it, where are |
these tag bits supposed to be kept anyway? |
The answer to the first of these questions is *reasonably* straightforward, |
and the clue is once again in the CHERI acronym: Capability Hardware |
Enhanced RISC-V *Instructions*. The instruction set itself for our target |
ISAs are augmented to support all these CHERI protections that we've been |
discussing. This is a crucial point - you may not have to rewrite your |
software to support CHERI, but you will need to recompile it with a CHERI- |
aware compiler. The various CHERI specifications allow for a CHERI-aware |
CPU to have it's CHERI protections switched on-and-off, meaning that you |
can run "legacy" (read: "non-CHERI") code alongside CHERI instructions. |
This means that you could have a CHERI-hardened kernel alongside some core |
system utilities, but still run programs that use the standard ISA (or even |
vice-versa: a legacy kernel but have userland applications make use of |
CHERI). We'll come back to these instructions and how they work a little |
later. |
As far as the second question goes, there are a couple of options we could |
take. The simplest (there goes that word again) is to let the memory |
controller use something it's already got lots of: memory. A small pocket |
of memory can be reserved that isn't addressable at all (and therefore |
completely invisible to any code running on the CPU) which can be used to |
store a single bit for every 128-bit region of memory. If the bit is set, |
then the corresponding region contains a capability, and if the bit is |
cleared, then the memory just contains data. While fairly straightforward, |
this approach can create issues with memory latency due to the controller |
having to check the tag bits (which necessarily live in different DRAM |
rows) for *every* access. Therefore another proposed solution is to make |
use of the additional bits present in ECC RAM. The precise method employed |
to store the tag bits doesn't matter a whole lot to the would-be CHERI |
exploit-writer, we just have to keep in mind that we are in all likelihood |
unable to touch those bits. |
So, let's take a bit of a review because we've covered a lot of ground |
already. Under CHERI, pointers have been replaced by capabilities and the |
memory controller is doing a lot of extra work to keep track of where |
capabilities are in RAM, as well as turning capabilities into regular ol' |
data as soon as they're modified in any unsanctioned or unexpected way. |
And to top it all off, we've got some extra instructions to play with to |
support all of this. Don't forget that registers are also now twice as wide |
as they used to be. |
What do we even call this model of computing? It's not quite von Neumann |
because code and data aren't completely interchangeable anymore (pointers |
aren't really code, but they're also not really data either anymore). It's |
also not quite Harvard either because code and data still live together |
side-by-side. We're somewhere in the middle. Personally I feel like we're |
still closest in spirit to von Neumann computing, but there's definitely a |
few shades of grey now. |
Congratulations - there's the theory out of the way. Let's get down to some |
solid examples of how CHERI works and how it could make our lives harder as |
exploit-writers. |
## Building and running CheriBSD for Morello |
One of the early specifications of CHERI for an ISA was for Aarch64, which |
has been dubbed by Arm as "Morello" [1,2]. Physical hardware apparently |
does exist, but it's in a developmental stage and seemingly very difficult |
to get your hands on. The CHERI team in Cambridge have produced a modified |
version of QEMU to support all the CHERI functionality, as well as a fork |
of LLVM that can emit CHERI instructions. They've also bundled all of this |
up into a git repo that lets you easily build everything you need to get a |
"CheriBSD" VM running. When building all of this, we have two options to |
choose from: whether to allow legacy non-CHERI instructions into the mix, |
called "hybrid" mode, or to only allow CHERI instructions to be executed in |
our VM, which is referred to as "purecap" mode (short for "pure- |
capability"). |
Seeing as this is an article all about CHERI and how it could affect the |
writers of binary exploits, let's stick with purecap mode to make sure |
we're getting the full effect. This means that the CheriBSD kernel and |
userland will be built with CHERI Aarch64 instructions. |
To start with, head over to the CHERIBuild GitHub repo [3], install any of |
the OS-specific dependencies you need and clone the repo somewhere. There |
are a few things that we need to build, so it might take a while. To get |
started, run the following (in order): |
``` |
./cheribuild.py qemu --include-dependencies |
./cheribuild.py cheribsd-morello-purecap --include-dependencies |
./cheribuild.py gdb-morello-hybrid-for-purecap-rootfs \ |
--include-dependencies |
./cheribuild.py disk-image-morello-purecap --include-dependencies |
``` |
Now we have a bootable disk image for CheriBSD that includes gdb. If you |
have any SSH public keys in your `~/.ssh`, when `cheribuild.py` creates the |
disk image, it should prompt you if you want to automatically copy them |
into `authorized_keys` in the CheriBSD image. This is a good idea because |
it means we'll be able to SSH into the Cheri VM, which will give us a nicer |
environment than the QEMU console, as well as letting us use SCP to copy |
our cross-compiled executables over. |
Finally, at long last we can boot CheriBSD under QEMU: |
``` |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.