Originally posted by NobodyXu
View Post
As for Android, Google is very clear that they are using Rust for new code:
https://security.googleblog.com/2022...ndroid-13.html
Originally posted by NobodyXu
View Post
Originally posted by NobodyXu
View Post
https://blog.cloudflare.com/how-we-b...-the-internet/
Cloudflare has an enormous amount of infrastructure. If I were one of their engineers, I would start by putting it into production on a fraction of the infrastructure, monitoring that and expanding from there. The monitoring will likely help to catch reliability bugs, but as far as security bugs go, those will not be caught by monitoring, since you need malicious packets being sent to the servers and until they open source it, outside of fuzzing, the black hat community will have no clue how to send malicious packets to their servers.
Originally posted by NobodyXu
View Post
Originally posted by NobodyXu
View Post
Getting to the same level as a mature solution takes time. To give a tangible example, we are seeing this right now with Intel's graphics drivers playing catch up with Nvidia's graphics drivers.
Originally posted by NobodyXu
View Post
A high level logic bug would be something where you cannot have a checker that will identify what is correct unless the checker is checking a proof of correctness for the software as part of formal verification. Here is an example of one of the more expensive ones:
http://edition.cnn.com/TECH/space/99...ars.metric.02/
Here is another example of a high level logic bug where they made a mistake transcribing mathematical equations:
https://medium.com/lessons-from-hist...n-23651aba474d
Interestingly, there are limits to Rust's guarantees even with "safe" Rust. If you use an out of bounds index in a way that the Rust compiler cannot detect in advance, it will terminate the program. Do that based on untrusted inputs in a daemon that provide a network service (e.g. as part of Pingora) and you have a DoS vulnerability. Rust being "memory safe" does not prevent out of bounds issues from being security problems, although it does change those security problems into DoS vulnerabilities. If such a bug exists in Pingora, then Cloudflare could see their CDN trivially disabled by a DDoS attack that operates by exploiting that bug rather than saturating bandwidth, but at least the Pingora code is memory safe.

That said, there is Clippy, which likely helps, provided that people use it:
https://github.com/rust-lang/rust-clippy
Comment