Introduction
In systems programming - the world you're about to enter - we've become complacent. Maybe even complicit.
We've promised our customers reliable and secure software, but with an implicit caveat: not at the cost of performance. And the fastest languages have traditionally been memory-unsafe. By using them, we actively risk both general functional requirements and our most base defensive posture:
-
Reliability: Memory safety errors cause unpredictable crashes (e.g. "segmentation faults"), unreproducible errors (e.g. "data races"), and eventual outages (e.g. "memory leaks").
-
Security: Those same memory errors might give an attacker the ability to read sensitive data (e.g. "steal secrets") or execute nearly arbitrary commands under the privileges of the victim program (e.g. "full control").
Your program crashing or producing incorrect output is one thing. Your machine joining a botnet is another1. Memory-unsafe programs risk both outcomes, simultaneously.
These incredible risks are largely mitigated2 in most modern "application languages", which use garbage collection and/or heavyweight runtimes (think Python, Java, or Go). Yet there are key verticals - safety-critical systems, high-performance distributed infrastructure, various kinds of firmware, etc. - that continue to rely on C and C++3.
Despite re-inventing themselves over time and powering much of the world's most critical software, these two traditional "systems languages" remain leading suppliers of worst-case security vulnerabilities (e.g. Heartbleed4, Stagefright5, EternalBlue6, Dirty Pipe7, etc). The memory corruption threat remains unabated.
Such is the cost of a multi-decade commitment to backwards compatibility. We don't seek to disparage the giants whose shoulders we stand on.
Yet those shoulders bear an awful burden. A seminal 2012 research paper8, aptly titled "Systematization of Knowledge: Eternal War in Memory", chronicled 30 years of failed C and C++ memory protection schemes. Every new defense has been undermined by a new bypass technique.
Fast forward to 2019. A Microsoft study9, of all security issues in the company's products between 2004 and 2018, claims:
~70% of the vulnerabilities addressed through a security update each year continue to be memory safety issues.
That percentage accounts for engineer experience and software quality processes at Microsoft - a market-leading titan. If you're already a C or C++ programmer, this is an uncomfortable truth. Understandable:
-
C was the revolution, it gave the world "high-level" programs portable across processors10. And today it runs, at some deep level, in nearly every device.
-
C++'s powerful abstractions enable performant systems of impressive scale: web browsers, graphics engines, databases, etc. Software we couldn't live without.
But evolution may be overdue. Google's 2022 analysis11 of previously-unknown (e.g. "zero-day") exploits "detected and disclosed as used in-the-wild" found that:
Out of the 58 in-the-wild 0-days for the year [2021], 39, or 67% were memory corruption vulnerabilities. Memory corruption vulnerabilities have been the standard for attacking software for the last few decades and it's still how attackers are having success.
Some of the exploits surveyed were actively used to target journalists, politicians, activists, and minority populations11. Memory corruption is not a theoretical problem. It's a pressing and severe issue that, in the worst case, has tangible human costs.
What if I'm just really careful, all the time?
Best practices for modern C-family languages can reduce the likelihood of memory vulnerabilities. But they can't seem to eliminate them. And, unlike Rust's compile time errors and runtime checks, best practices are difficult to scale.
Decades of data indicate that developer diligence and extensive testing cannot reliably solve the memory safety problem. It's time to seriously consider addressing the root cause.
We Don't Need to Be Complacent Anymore
Rust, as a relatively new systems language, supports what have traditionally been C/C++ domains. It offers an alternative set of paradigms, namely compiler-enforced "ownership"12.
If you've never tried Rust, imagine pair programming alongside a nearly-omniscient but narrowly-focused perfectionist. That's what the borrow checker, a compiler component implementing the ownership concept, can sometimes feel like.
In exchange for the associated learning curve, we get memory safety guarantees. That means we can, often but not always, prove the absence of all memory errors with certainty.
Rust was announced by Mozilla in 201013, is led by an independent non-profit as of 202114, and largely solves the single most pressing security problem in the last 40 years of systems programming: memory safety.
It's arguably the first commercially viable programming language simultaneously offering both memory safety and bare metal speed.
Is that just an opinion?
It's an opinion gaining formidable momentum. Past some threshold of social acceptance and market pressures, it might even become a boring stance. Here are similar takes from some of Rust's production users:15
Amazon:16
...at AWS we increasingly build critical infrastructure like the Firecracker VMM using Rust because its out-of-the-box features reduce the time and effort needed to reach Amazon’s high security bar, while still delivering runtime performance similar to C and C++.
Google:17
We feel that Rust is now ready to join C as a practical language for implementing the [Linux] kernel. It can help us reduce the number of potential bugs and security vulnerabilities in privileged code while playing nicely with the core kernel and preserving its performance characteristics.
Microsoft:18
[Rust is] the industry's best chance for addressing this [memory safety] issue head-on.
Moreover, Rust has begun to appear at the forefront of US government security guidance. In the time since this section was originally published (March 2022), we've seen various government entities explicitly name Rust as a solution to the dire societal problem of memory safety:
National Security Agency (NSA):19
Software analysis tools can detect many instances of memory management issues and operating environment options can also provide some protection, but inherent protections offered by memory safe software languages can prevent or mitigate most memory management issues. NSA recommends using a memory safe language when possible.
...Examples of memory safe language include C#, Go, Java, Ruby, Rust, and Swift.
Cybersecurity and Infrastructure Security Agency (CISA):20
In what other industry would the market tolerate such well-understood and severe dangers for users of products for decades?
...What has been lacking until a few years ago is a language with the speed of C/C++ with built-in memory safety assurances. In 2006, a software engineer at Mozilla began working on a new programming language called Rust. Rust version 1.0 was officially announced in 2015.
National Institute of Standards and Technology (NIST):21
Safety or quality cannot be "tested into" programs. It must be designed in from the start. Choosing to implement with a safer or more secure language or language subset can entirely avoid whole classes of weaknesses.
...Rust has an ownership model that guarantees both memory safety and thread safety, at compile-time, without requiring a garbage collector. This allows users to write high-performance code while eliminating many bug classes. Though Rust does have an unsafe mode, its use is explicit, and only a narrow scope of actions is allowed.
Does that mean Rust programs can't be compromised?
Definitely not. Memory corruption is just one bug class. It's particularly vicious and is often part of high-value exploit chains22, but other bug classes exist.
Many, if not most, security issues are language-agnostic (e.g. misconfiguration23, command injection24, hardcoded secrets25, etc). And memory-safe languages infrequently introduce their own issues (e.x. interpreter evaluation of untrusted input, aka "eval injection"). No programming language will make your code absolutely secure against all attacks.
Moreover, Rust has a dirty little secret.
Let's address it up front: sometimes it's necessary to use Rust's unsafe
keyword, which allows potentially memory-unsafe behavior within a specific block of code.
The intention is for a human to carefully review the safety of actions the compiler can't automatically verify.
And only in a few key places, instead of the entire codebase.
We won't need to use unsafe
at all in this book's core project!
You'll learn how to reframe problems in an idiomatic way to maximize Rust's guarantees.
That's a critical skill for getting tangible security value out of the language.
But, for your situational awareness and future endeavors, we'll:
- Cover
unsafe
's usage and implications in detail. - Learn tools for auditing the safety of Rust applications.
- Review a handful of real-world vulnerabilities in Rust software, as case studies.
- Build Foreign Function Interface (FFI) bindings to call our Rust code from unsafe languages.
Rust is a monumental leap forward in systems security, not a panacea.
Is Rust going to replace C and/or C++?
C and C++ power some of the most widely used software in the modern world. A vast number of C-family codebases have been around for multiple decades, and will march on for several more. Because they provide time-tested solutions to important problems.
Professional systems programmers stand to benefit from experience in all three languages. The C-family is not going away any time soon. And Rust integrates with existing C/C++ code. Without runtime overhead.
This is a Rust book, but you'll see several small snippets of C. These will usually demonstrate subtle "undefined behavior" problems that all C programmers should be aware of.
We'll also write bindings for calling the library you build from C via a Foreign Function Interface (CFFI). That's a prerequisite to integrating new Rust components into existing codebases written in another language.
The Curious Case of
curl
curl
26, a utility for transferring data with URLs that's been ubiquitous since 1998, is written in C. Because the tool is so heavily relied upon, its security impacts much of what we consider "the internet"27.As of 2020,
curl
has integrated Rust backends for HTTP and TLS (called via CFFI) to bolster security27. Memory safe Rust code seamlessly integrates with the existing C code. It's all one compiled binary, there's no performance penalty for cross-language interoperability.Although the average end user can't tell the difference (and that's a good thing!),
curl
is now a safer, more reliable program28.
Is adopting a new language really worth the effort?
You've likely invested significant experience-hours in your language/toolchain/ecosystem of choice. Even if much of your knowledge is transferable, is Rust worth the effort?
Not for every project. Rust is a compelling choice when performance, reliability, and security are all mission-critical requirements. At this intersection of polarized criteria, the barrier to justifiable confidence has traditionally been absurdly high. We're talking "formal methods": machine-assisted proofs, model checking, symbolic execution, etc. Approaches that, while valuable, face roadblocks to significant adoption in industry.
Now, Rust's guarantees are a small subset of what those verification approaches provide collectedly. But Rust also avoids many of the associated practicality pitfalls.
Rust's compiler proves29 a specific set of important properties almost automatically, enabling us to ship quickly. On the surface, we get memory safety without sacrificing low-latency performance. Dig deeper, and our advantage is really principled verification at the pace of commercial development. We get [some] proofs at the speed of real-world code.
Isn't verification only for toy programs?
Most formally-backed guarantees are restricted to research prototypes; they simply don't scale to large, multi-threaded codebases. So formal methods have a bad rap with practicing software engineers - too much difficulty, not enough value.
By contrast, the Rust compiler was originally designed to harden components of Firefox's browser engine13 - a multi-million line, highly parallel, commercial codebase.
Now any tool, no matter how potentially beneficial, must be usable to see adoption and impact.
Despite an initial learning curve, Rust was voted the "most loved" programming language for the last 7 years in a row. In StackOverflow's annual developer survey30, which had over 73,000 responses in 202231.
Alright. So can I learn Rust?
Imagine you chose to immigrate to a different country and learn to speak a new language. It wouldn't be easy, but it might be worth it. Our foray into high assurance programming in Rust will likewise be a challenging yet rewarding one.
Here's the beauty of learning something new: anyone can do it. It takes a bit of time and the right resources, but if you stick with it long enough things will start to click. This book will help you quickly tame the high learning curve of Rust, so we can all build systems software we can collectively rely on.
Learning Outcomes
- Understand what this book covers and why
- Understand where this book fits within the Dreyfus Model of Skill Acquisition
- Setup a development environment so you can start writing Rust
You Can't Spell Trust Without Rust. Alexis Beingessner (2015). This Master's thesis by one of the Rust standard library BTree authors is the source of this botnet analogy, and a general influence on this book.
"Largely" is a caveat here: Python can have data races, Go can have segmentation faults, etc. But garbage collected languages don't give attackers the same powerful exploitation primitives as C and C++ (more details coming in Chapter 4), so they don't carry the same risks.
You'd be right to argue that C and C++ have as little in common with each other as they do with their former selves. C++1132 bears little resemblance to C++2033. In lieu of a skim: the official C++ language standard grew by 515 pages, almost 40%, from 1,30832 to 1,82333 in total.
Embedded System Security with Rust: Case Study of Heartbleed. Jens Getreu (2016).
Stagefright: Scary Code in the Heart of Android. Joshua Drake (2015)
EternalBlue Exploit: What It Is And How It Works. SentinelOne (2019).
The Dirty Pipe Vulnerability. Max Kellerman (2022).
SoK: Eternal War in Memory. Laszlo Szekeres, Mathias Payer, Tao Wei, Dawn Song (2012).
Trends, challenges, and strategic shifts in the software vulnerability mitigation landscape. Mat Miller (2019)
Episode 53 - C Level, Part I. Sean Haas (2021). As this podcast explains, C was not the first language to compile to assembly - it's a practical variant of the idea that gained widespread adoption.
The More You Know, The More You Know You Don't Know. Maddie Stone, Google Project Zero (2022).
Ownership isn't entirely new, similar concepts were pioneered by research languages. Lifetimes, a closely related concept, has existed in the C++ community for a while34. But Rust's novel ownership system enforces lifetime rules at compile time. In C++, lifetime assumptions can be violated at runtime if you're not careful. Bugs and vulnerabilities can ensue. Some people argue that Rust crystallizes certain C++ best practices in the compiler itself.
Project Servo, Technology from the past come to save the future from itself. Graydon Hoare (2010).
Hello World!. Ashley Williams (2021).
Production Users. The Rust Team (Accessed 2022).
Why AWS loves Rust, and how we’d like to help. Matt Asay, Official AWS Open Source Blog (2020).
Rust in the Linux kernel. Wedson Almeida Filho, Official Google Security Blog (2021).
Microsoft: Rust Is the Industry’s ‘Best Chance’ at Safe Systems Programming. Joab Jackson (2020).
Software Memory Safety. NSA (2022).
The Urgent Need for Memory Safety in Software Products. Bob Lord, CISA (2023).
Safer Languages. NIST (2023).
Zoom RCE from Pwn2Own 2021. Thijs Alkemade, Daan Keupe (2021).
A05:2021 – Security Misconfiguration. OWASP (2021).
Apache Log4j Vulnerability Guidance. CISA (2021).
CVE-2022-1162. National Vulnerability Database (2022).
curl. Daniel Stenberg (2021).
Memory Safe ‘curl’ for a More Secure Internet. Internet Security Research Group (2020).
As of this writing, the Rust-enabled build of curl
is not its default configuration. It's up to those building and distributing curl
(e.g. OS distro maintainers) to choose build configurations suitable for the platforms and users they support. A reasonable arrangement worth noting!
Computer Scientist proves safety claims of the programming language Rust. Saarland University (2021). Note that formal verification of Rust is a research problem with both current successes and ongoing work.
Technology: Most loved, dreaded, and wanted. StackOverflow (2022).
Methodology: Participants. StackOverflow (2022).
[Final] Working Draft, Standard for Programming Language C++. Document Number:N3337 (2012). Document number 3337 - so close to 1337! Missed opportunity.
[Final] Working Draft, Standard for Programming Language C++. Document Number:N4861 (2020).
Lifetime. cppreference.com (Accessed 2022).