Hardening Executables
Quite a while ago, Arch Linux has turned on many binary security features via compilation flags (2016)1 or turned off options that are known to help exploit software (debugging symbols, RPATH). Now we have 2021 and Arch Linux made good experience with the additional security options.
We made good experience on Arch Linux with the following flags so far:
- FULL RELRO (Full Relocation Read-Only)2
- STACK CANARY3
- NX-Bit4
- PIE (Position Independent Executable/Code)5
- Setting no RPATH6
- Setting no Symbols
- FORTIFY7
Some of these flags are known to have effects on performance. A ‘call for assistance’8 in 2016 tried to measure these effects via running different operations with executables that have above flags enabled. The project9 delivered good results10 and we decided to enable these flags.
For validating ELF executables we use the tool checksec.sh.
The follows snippet shows the example output of check-sec --file=/usr/bin/kubectl
with kubectl version 1.21.3-1 on Arch Linux:
RELRO STACK CANARY NX PIE RPATH RUNPATH Symbols FORTIFY Fortified Fortifiable FILE
Full RELRO Canary found NX enabled PIE enabled No RPATH No RUNPATH No Symbols Yes 2 3 /usr/bin/kubectl
We achieved a fully hardened kubectl binary via the following methods:
- We set CGO flags for passing enhanced security flags to the compiler:
export CGO_CPPFLAGS="${CPPFLAGS}"
export CGO_CFLAGS="${CFLAGS}"
export CGO_CXXFLAGS="${CXXFLAGS}"
export CGO_LDFLAGS="${LDFLAGS}"
These flags are:
- CPPFLAGS=”-D_FORTIFY_SOURCE=2”
- CFLAGS=”-march=x86-64 -mtune=generic -O2 -pipe -fno-plt”
- CXXFLAGS=”-march=x86-64 -mtune=generic -O2 -pipe -fno-plt”
- LDFLAGS=”-Wl,-O1,–sort-common,–as-needed,-z,relro,-z,now”
- We compile our Go packages with the following GOFLAGS:
export CGO_ENABLED=1
export GOFLAGS="-buildmode=pie -trimpath -mod=readonly -modcacherw"
export GOLDFLAGS="-linkmode=external"
Explanation for each flag:
- CGO_ENABLED needs to be set to 1 for most of the features.. this can make binary distribution problematic.
- -buildmode=pie enables PIE compilation for binary harderning.
- -trimpath important for Reproducible Builds so full build paths and module paths are not embedded.
- -mod=readonly ensure the module files are not updated in any go actions.
- -modcacherw is not important, but it ensures that go modules creates a write-able path. Default is read-only.
- -linkmode=external ensure we use an external linker, because the Go linker is not capable of all operations that are necessary.
Our full Go package guidelines can be found in our Wiki11. This article has been heavily influenced by and partly copied from an issue in the CNCF/tag-security repository
https://lists.archlinux.org/pipermail/arch-dev-public/2016-October/028405.html ↩︎
https://www.redhat.com/en/blog/hardening-elf-binaries-using-relocation-read-only-relro ↩︎
https://en.wikipedia.org/wiki/Stack_buffer_overflow#Stack_canaries ↩︎
https://www.archlinux.org/news/test-sec-flags-call-for-assistance/ ↩︎
https://wiki.archlinux.org/index.php/Go_package_guidelines#Flag_meaning ↩︎