Distributed fuzzing platform on Kubernetes.
Note: This is early access software with no production-ready releases yet. It works, but there's a lot left to do to make it easy to use.
Lagopus is a distributed fuzzing application built on top of Kubernetes. It
allows you to fuzz arbitrary targets using clustered compute resources. You
specify the target binary, fuzzing driver (afl
or libFuzzer
), corpus, and
job parameters such as #CPUs, memory and TTL. Lagopus then creates a container
for the fuzzing job and runs it on an available cluster node.
Lagopus takes much of the manual work out of analyzing fuzzing results. When a fuzzing job finishes, Lagopus collects any crashing inputs and their stack traces and analyses them for type and severity. Results are collated, deduplicated and stored in a database. The generated corpus is cleaned and minimized. All results are deposited in your NFS share for later use.
Lagopus has a web interface for creating jobs, monitoring progress and fuzzing statistics, and viewing crash analyses. This interface is built on top of a HTTP REST API which can be used for integration with external tools such as CI/CD systems and test suites.
Lagopus runs on Kubernetes, so it runs as well in on-prem, bare metal deployments as it does on your choice of k8s cloud providers.
See the docs for:
-
Q: Why not ClusterFuzz?
A: ClusterFuzz is tightly integrated with Google Cloud. While bots can be deployed locally with some effort, the application itself runs on App Engine, requires Firebase for authentication, only supports Google for user authentication, and is quite difficult to deploy. Perhaps the most annoying thing is that ClusterFuzz has a hard dependency on Google Cloud Storage for fuzzing results. Because of the amount of corpus data generated by fuzzers, and the long term size of uploaded target binaries, this can get expensive. App Engine is also an unavoidable fixed cost. Finally, even if a cloud budget is available, CF still locks you into Gcloud.
ClusterFuzz is primarily designed for Google's scale and use cases. Google uses ClusterFuzz to fuzz V8, Fuschia and Android, so much of the codebase has customizations for these targets. It's also designed as a massively scalable system - Google claims their internal instance is sized at 25,000 nodes. Depending on who you are, these design choices could be a pro or con. I personally wanted something lighter, with first class support for on prem deployments as well as non-Google clouds, and a smaller, more hackable codebase.
Please note that none of this should be taken as criticism directed at Google, ClusterFuzz, or any of the people working on ClusterFuzz. ClusterFuzz is obviously super awesome for the scale and workloads it is designed for, and if you have the cloud budget and scaling requirements, it's your best option. Lagopus is for the rest of us :)
-
Q: Why just AFL and libFuzzer?
A: I am most familiar with those tools. More fuzzers can be added with time.
-
Q: Why Kubernetes?
A: Kubernetes is, to my knowledge, the only clustered orchestration tool that supports certain features necessary for high performance fuzzing jobs, such as static CPU resources, privileged containers, and distributed storage. Also, my existing workloads were already running in Docker. And I wanted to learn Kubernetes.
-
Q: Why lagopus?
A: Cuz they're awesome ^_^
-
Q: My target is dynamically linked and the fuzzer image doesn't have its shared libraries; what do?
A: I've had good success with ermine. Statifier will likely not work due to ASLR.
If you can't statically link your target, then you can simply copy the necessary dependencies into the job zip and install them via
provision.sh
, as described in the docs.
Other projects in the same vein.
- The venerable ClusterFuzz, parts of which are used in Lagopus
- LuckyCat (greetz!)
You should have a k8s cluster, ideally on bare metal, or vms with static CPU resources.
You should have at least 1 node with at least 4 real CPUs (not hyperthreads / smt). More CPUs are better. More nodes are better.
You should understand how AFL and libFuzzer operate and the differences between them.
You should be aware that fuzzers thrash disk and consume massive amounts of CPU, and plan accordingly. See AFL docs for more info.
You should understand how rss limits work with ASAN on x86-64, and how libFuzzer and AFL handle those.
You should install the absolute latest stable version of k8s. This project uses advanced features of k8s for performance reasons, many of which are only available in k8s >= v1.17.
It's a good idea to have an operational understanding of Kubernetes. Specifically, you will have an easier time with debugging cluster setup if you understand how k8s handles:
sysctl
s- CPU management policies (
none
andstatic
) - CPU affinity & resources
- Container QOS policies (
Guaranteed
,BestEffort
, etc)
Complicated:
-
Lagopus cannot distribute multithreaded / multiprocess jobs across nodes. Distribution is at the job level; a single job is always contained to a single node (but not vice versa). This means a small cluster where each node has a high CPU count is preferable to a larger cluster of smaller nodes.
-
Lagopus depends on the existence of an NFS share external to itself to store job data. This isn't really a limitation, but it slightly complicates initial setup.
-
Lagopus runs on Kubernetes, which can be a significant barrier for people who aren't familiar with it.
Planned:
Backtrace collection✔️Job monitoring✔️Job input validation✔️- Source-based code coverage viewer
- Better deployment process
- Job tags
- CLI client
- Corpus management
- More fuzzers
- Performance audit
- TLS support
- Security (always last :-)
Wishlist:
- Authentication
- Docker-compose support
- Reduce k8s tendrils
- Reduce vendored code
- Support for interpreted targets
- Support for non-x64 targets
Miscellaneous bits of information that may be relevant in the future, or for debugging.
-
gdb
will not work in a container withoutseccomp=unconfined
; this is the default in k8s, so it's not explicitly set anywhere in Lagopus, but when running the fuzzer container manually make sure to pass--security-opt seccomp=unconfined
or you won't get the detailed analysis of crashes usually provided by exploitable. -
Lagopus was using gdb exploitable ^ to analyze crashes, but exploitable is currently turned off because its heuristics see ASAN terminations as clean exits. Currently the crash analysis code is lifted from ClusterFuzz, as it already has all the gritty regexes and classifiers sorted out.
-
afl
requires sysctlkernel.core_pattern=core
to get core files. k8s has support for allowing nodes to allow pods to set sysctls (pods also have settings to allow that at the pod level) which results in a taint on the node and therefore requires tolerances on the pod. However, k8s only supports namespaced sysctls;kernel.core_pattern
isn't one, and thus must be manually set on the node entirely outside of k8s before starting the kubelet. -
Fuzzer jobs should run with dedicated cores, for a couple reasons. The first is that this is just better for performance regardless of the particular fuzzer in use. The second is more subtle, and applies to fuzzers that pin themselves to particular CPUs in order to increase cache locality and reduce kernel scheduler overhead.
afl
in particular does this. When starting up,afl
searches for "free" (not already pinned by another process) CPU cores to bind itself to, which it determines by looking at/proc
. However,/proc
is not bind mounted into containers by default, so it's possible for another process, either on the host or another container, to be bound to a given CPU even though the container's/proc
says the core is free. In this case the bind will still work but now you have two processes pinned to the same CPU on the host. This is far worse than not binding at all. So until container runtimes fix this (if they ever do), CPU assignments must be manually set on the container itself by the container runtime.This is a bit tricky to do in k8s. First the nodes must be configured with the
static
cpu policy by passing--cpu-manager-policy=static
to kubelet. Second, the pod containers must be in the "Guaranteed" QOS class, which means both requests and limits for both memory and cpu must be set, and must equal each other. This will cause each container to have N CPUs assigned to it exclusively, which solves the issue with/proc
by sidestepping it completely.However, again there is a caveat. A peculiarity of container runtimes is that even when containers are assigned to specific CPUs, the containers still see all of the host CPUs and don't actually know which of them have been assigned to it. This again poses some complications with
afl
's CPU pinning mechanism.afl
's current (upstream) CPU selection heuristics will usually fail when run in a container because it tries to bind to the first available CPU (as per/proc
), typically CPU 0, which may or may not be assigned to the container. If not, the system call to perform the bind -sched_setaffinity
- will fail andafl
will bail out. This is solved for Lagopus by packaging a patchedafl
that tries all cores until it finds one that binding succeeds on. I have an open PR[0] againstafl
for this patch, so hopefully at some point Lagopus can go back to using upstreamafl
. However, Google doesn't seem to be paying much attention to the repository, so who knows how long that will take.[0] google/AFL#68
-
It would be nice to use halfempty for minimization instead of the current tools, as it's much faster. This can probably be done fairly easily.
-
Corpus minimization probably shouldn't be subject to the same resource constraints as fuzzing itself, because it takes so long. However, doing this would introduce a lot of complications; multiple stages of pods (hard to do with k8s Jobs), resource availability no longer corresponds directly to the jobs the user scheduled...definitely should evaluate halfempty first to see if it speeds things up enough on e.g. 2 core jobs to make this a non issue.
-
Jobs could be distributed across nodes by using the NFS share as a source for new corpus inputs and periodically synchronizing?
-
Collecting
perf stat
output for fuzzing tasks into InfluxDB could be cool. However, perf inside containers is still a pita, for the same reasons that make procfs a pain. Brendan Gregg touched on this in his container perf talk, https://www.youtube.com/watch?v=bK9A5ODIgac @ 33m.