Conversation

Systems code benefits from memory and type safety even more than most other code because it's often in a position of trust and privilege. Using a language where unsafety can be contained and quickly wrapped into safe APIs is certainly useful advice for newly written systems code.
1
6
The expectations of software robustness and security have increased a lot, and it's simply not realistic to achieve it while using unsafe tools making it much more difficult to write safe code. Writing something complex like an safe ext4 implementation is C is not very realistic.
1
5
i.e. writing the entire thing with zero memory corruption bugs for an attacker to exploit either via an attacker controlled filesystem or an application. Drivers similarly have to be written treating the hardware and code using them as adversarial. Choice of tools is important.
1
2
This Tweet was deleted by the Tweet author. Learn more
No, that's not what he means. He's saying that an external file system should have a sandboxed filesystem driver, so that exploiting a bug inside it doesn't immediately grant complete control over the entire system and at least requires privesc to escape (likely via the kernel).
1
4
This Tweet was deleted by the Tweet author. Learn more
FWIW, I've never considered ext4 as a candidate for removable media. If your threat model includes physical alteration of internal drives you have bigger problems than ext4 CVEs. If your udev scripts auto-mount external ext4, your distro integrators are incompetent.
1
1
The internal filesystem for state outside of the verified OS is part of the attack surface for verified boot. An attacker that compromises the system and wants to persist access needs to either defeat the tiny attack surface of verification or exploit the OS via persistent state.