Rocksolid Light

Welcome to novaBBS (click a section below)

mail  files  register  newsreader  groups  login

Message-ID:  

"I'm not a god, I was misquoted." -- Lister, Red Dwarf


computers / comp.os.vms / Re: NSA on programming languages

SubjectAuthor
* NSA on programming languagesArne Vajhøj
+* Re: NSA on programming languagesSimon Clubley
|+* Re: NSA on programming languagesStephen Hoffman
||+- Re: NSA on programming languagesSimon Clubley
||`- Re: NSA on programming languagesDan Cross
|`- Re: NSA on programming languagesArne Vajhøj
+* Re: NSA on programming languagesIanD
|`- Re: NSA on programming languagesArne Vajhøj
`- Re: NSA on programming languagesArne Vajhøj

1
NSA on programming languages

<tkmuqj$tb7$1@gioia.aioe.org>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=25594&group=comp.os.vms#25594

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!aioe.org!LeVffQP25j5GAigzc2gaQA.user.46.165.242.75.POSTED!not-for-mail
From: arn...@vajhoej.dk (Arne Vajhøj)
Newsgroups: comp.os.vms
Subject: NSA on programming languages
Date: Fri, 11 Nov 2022 21:01:54 -0500
Organization: Aioe.org NNTP Server
Message-ID: <tkmuqj$tb7$1@gioia.aioe.org>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Info: gioia.aioe.org; logging-data="30055"; posting-host="LeVffQP25j5GAigzc2gaQA.user.gioia.aioe.org"; mail-complaints-to="abuse@aioe.org";
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:102.0) Gecko/20100101
Thunderbird/102.4.2
Content-Language: en-US
X-Notice: Filtered by postfilter v. 0.9.2
 by: Arne Vajhøj - Sat, 12 Nov 2022 02:01 UTC

https://media.defense.gov/2022/Nov/10/2003112742/-1/-1/0/CSI_SOFTWARE_MEMORY_SAFETY.PDF

National Security Agency | Cybersecurity Information Sheet
Software Memory Safety

<quote>
While developers often perform rigorous testing to
prepare the logic in software for surprising conditions, exploitable
software
vulnerabilities are still frequently based on memory issues. Examples
include
overflowing a memory buffer and leveraging issues with how software
allocates and de-
allocates memory. Microsoft revealed at a conference in 2019 that from
2006 to 2018
70 percent of their vulnerabilities were due to memory safety issues.
Google also
found a similar percentage of memory safety vulnerabilities over several
years in
Chrome.
</quote>

<quote>
Commonly used languages, such as C and C++, provide a lot of freedom and
flexibility
in memory management while relying heavily on the programmer to perform
the needed
checks on memory references. Simple mistakes can lead to exploitable
memory-based
vulnerabilities. Software analysis tools can detect many instances of memory
management issues and operating environment options can also provide some
protection, but inherent protections offered by memory safe software
languages can
prevent or mitigate most memory management issues. NSA recommends using a
memory safe language when possible. While the use of added protections
to non-
memory safe languages and the use of memory safe languages do not
provide absolute
protection against exploitable memory issues, they do provide
considerable protection.
Therefore, the overarching software community across the private sector,
academia,
and the U.S. Government have begun initiatives to drive the culture of
software
development towards utilizing memory safe languages.
</quote>

<quote>
Using a memory safe language can help prevent programmers from
introducing certain
types of memory-related issues. Memory is managed automatically as part
of the
computer language; it does not rely on the programmer adding code to
implement
memory protections. The language institutes automatic protections using
a combination
of compile time and runtime checks. These inherent language features
protect the
programmer from introducing memory management mistakes unintentionally.
Examples
of memory safe language include C#, Go, Java, Ruby™, Rust, and Swift.
</quote>

Arne

PS: Only Java and Ruby are currently available on VMS.

Re: NSA on programming languages

<tku2f2$1qf7b$2@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=25615&group=comp.os.vms#25615

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: club...@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: Re: NSA on programming languages
Date: Mon, 14 Nov 2022 18:46:59 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 23
Message-ID: <tku2f2$1qf7b$2@dont-email.me>
References: <tkmuqj$tb7$1@gioia.aioe.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: 8bit
Injection-Date: Mon, 14 Nov 2022 18:46:59 -0000 (UTC)
Injection-Info: reader01.eternal-september.org; posting-host="09d11c4ccb2b89694cf2002d1254b982";
logging-data="1916139"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19Noq4Wose0ssZfkVU4eOanMcKjpijLGfk="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:t/MOwOeO/9DjGkEpqprihgWAvxY=
 by: Simon Clubley - Mon, 14 Nov 2022 18:46 UTC

On 2022-11-11, Arne Vajhøj <arne@vajhoej.dk> wrote:
>
><quote>
> Examples
> of memory safe language include C#, Go, Java, Ruby?, Rust, and Swift.
></quote>
>

There's a language missing from that list.

On a related note, I've just found out today that NVIDIA have made
a _very_ interesting decision with regards to moving towards using
a safer programming language:

https://developers.slashdot.org/story/22/11/13/010222/nvidia-security-team-what-if-we-just-stopped-using-c

I wonder if they will be a one-off or if more organisations will follow ?

Simon.

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.

Re: NSA on programming languages

<tkuadv$1rahv$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=25621&group=comp.os.vms#25621

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: seaoh...@hoffmanlabs.invalid (Stephen Hoffman)
Newsgroups: comp.os.vms
Subject: Re: NSA on programming languages
Date: Mon, 14 Nov 2022 16:02:55 -0500
Organization: HoffmanLabs LLC
Lines: 60
Message-ID: <tkuadv$1rahv$1@dont-email.me>
References: <tkmuqj$tb7$1@gioia.aioe.org> <tku2f2$1qf7b$2@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Info: reader01.eternal-september.org; posting-host="c241493df04c42b18faa73da2e16278c";
logging-data="1944127"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+yJSdM4JXwm+tiSFPwbZ6XJbPZYmkbZxk="
User-Agent: Unison/2.2
Cancel-Lock: sha1:Y4AqtXa1M0aEZQUDPoczx1qY2nc=
 by: Stephen Hoffman - Mon, 14 Nov 2022 21:02 UTC

On 2022-11-14 18:46:59 +0000, Simon Clubley said:

> On 2022-11-11, Arne Vajhøj <arne@vajhoej.dk> wrote:
>>
>> <quote>
>> Examples of memory safe language include C#, Go, Java, Ruby?, Rust, and Swift.
>> </quote>
>>
>
> There's a language missing from that list.

Yes, there are various languages missing from that list. Hence the use
of the word "include" there, and not a word such as "comprise".

> On a related note, I've just found out today that NVIDIA have made a
> _very_ interesting decision with regards to moving towards using a
> safer programming language:
>
> https://developers.slashdot.org/story/22/11/13/010222/nvidia-security-team-what-if-we-just-stopped-using-c
>
>
> I wonder if they will be a one-off or if more organisations will follow ?

There have been other organizations making a similar shift.

And it gets easier. Rust kernel support is now part of Linux.
<https://docs.kernel.org/rust/index.html>

From a few years ago, Microsoft has been pondering and prototyping
Rust:
<https://msrc-blog.microsoft.com/2019/11/07/using-rust-in-windows/>

Apple was hiring for folks to migrate existing C system into Rust from
a few years ago, though with few details. ("The performance and
security of the systems we build are critical. We interface directly to
low-level Linux kernel interfaces, using asynchronous I/O and threads
to distribute workload. Following a very successful first foray into
Rust we are migrating an established codebase from C to Rust, and
building new functionality primarily in Rust." )

As for other languages for that list, Google have added Carbon
<https://github.com/carbon-language/carbon-lang>, so we'll see how that
works out.

This C-to-Rust transpiler looks like fun, not that I'd be in a rush to
push the resulting (unsafe) Rust code into production:
<https://github.com/immunant/c2rust>

As for transpiling or rewriting more generally, few places will go to
the effort of replacing the existing C or C++ code—or the existing
BLISS or Macro32 code, for that matter—to anything else. Not past
incremental work and updates, or replacement when substantial updates
are needed, or other issues arise. Issues such as when one vendor was
replacing their existing Ada code due to (a lack of) compiler support
on the target platform.

--
Pure Personal Opinion | HoffmanLabs LLC

Re: NSA on programming languages

<tkuo5g$d7h$1@gioia.aioe.org>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=25626&group=comp.os.vms#25626

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!aioe.org!LeVffQP25j5GAigzc2gaQA.user.46.165.242.75.POSTED!not-for-mail
From: arn...@vajhoej.dk (Arne Vajhøj)
Newsgroups: comp.os.vms
Subject: Re: NSA on programming languages
Date: Mon, 14 Nov 2022 19:57:19 -0500
Organization: Aioe.org NNTP Server
Message-ID: <tkuo5g$d7h$1@gioia.aioe.org>
References: <tkmuqj$tb7$1@gioia.aioe.org> <tku2f2$1qf7b$2@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Info: gioia.aioe.org; logging-data="13553"; posting-host="LeVffQP25j5GAigzc2gaQA.user.gioia.aioe.org"; mail-complaints-to="abuse@aioe.org";
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:102.0) Gecko/20100101
Thunderbird/102.4.2
Content-Language: en-US
X-Notice: Filtered by postfilter v. 0.9.2
 by: Arne Vajhøj - Tue, 15 Nov 2022 00:57 UTC

On 11/14/2022 1:46 PM, Simon Clubley wrote:
> On 2022-11-11, Arne Vajhøj <arne@vajhoej.dk> wrote:
>> <quote>
>> Examples
>> of memory safe language include C#, Go, Java, Ruby?, Rust, and Swift.
>> </quote>
>
> There's a language missing from that list.

I assume you are thinking about Ada.

But first the Ada got a great future behind it.

Secondly Ada only address some of the listed
problems - not the deallocation problem. Or?

Arne

Re: NSA on programming languages

<a777d667-6388-46bb-b9ae-8ea1fd832376n@googlegroups.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=25632&group=comp.os.vms#25632

  copy link   Newsgroups: comp.os.vms
X-Received: by 2002:a05:622a:1e14:b0:3a5:7679:2fa1 with SMTP id br20-20020a05622a1e1400b003a576792fa1mr15276474qtb.258.1668508477658;
Tue, 15 Nov 2022 02:34:37 -0800 (PST)
X-Received: by 2002:a05:620a:1319:b0:6fa:9a5e:7ca8 with SMTP id
o25-20020a05620a131900b006fa9a5e7ca8mr14941506qkj.70.1668508477466; Tue, 15
Nov 2022 02:34:37 -0800 (PST)
Path: i2pn2.org!i2pn.org!usenet.blueworldhosting.com!feed1.usenet.blueworldhosting.com!peer02.iad!feed-me.highwinds-media.com!news.highwinds-media.com!news-out.google.com!nntp.google.com!postnews.google.com!google-groups.googlegroups.com!not-for-mail
Newsgroups: comp.os.vms
Date: Tue, 15 Nov 2022 02:34:37 -0800 (PST)
In-Reply-To: <tkmuqj$tb7$1@gioia.aioe.org>
Injection-Info: google-groups.googlegroups.com; posting-host=159.196.118.223; posting-account=0tEijwoAAAAMP4aWao59DU5bzWsrJu9_
NNTP-Posting-Host: 159.196.118.223
References: <tkmuqj$tb7$1@gioia.aioe.org>
User-Agent: G2/1.0
MIME-Version: 1.0
Message-ID: <a777d667-6388-46bb-b9ae-8ea1fd832376n@googlegroups.com>
Subject: Re: NSA on programming languages
From: iloveope...@gmail.com (IanD)
Injection-Date: Tue, 15 Nov 2022 10:34:37 +0000
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Received-Bytes: 4219
 by: IanD - Tue, 15 Nov 2022 10:34 UTC

On Saturday, November 12, 2022 at 1:01:58 PM UTC+11, Arne Vajhøj wrote:
> https://media.defense.gov/2022/Nov/10/2003112742/-1/-1/0/CSI_SOFTWARE_MEMORY_SAFETY.PDF
>
> National Security Agency | Cybersecurity Information Sheet
> Software Memory Safety
>
> <quote>
> While developers often perform rigorous testing to
> prepare the logic in software for surprising conditions, exploitable
> software
> vulnerabilities are still frequently based on memory issues. Examples
> include
> overflowing a memory buffer and leveraging issues with how software
> allocates and de-
> allocates memory. Microsoft revealed at a conference in 2019 that from
> 2006 to 2018
> 70 percent of their vulnerabilities were due to memory safety issues.
> Google also
> found a similar percentage of memory safety vulnerabilities over several
> years in
> Chrome.
> </quote>
>
> <quote>
> Commonly used languages, such as C and C++, provide a lot of freedom and
> flexibility
> in memory management while relying heavily on the programmer to perform
> the needed
> checks on memory references. Simple mistakes can lead to exploitable
> memory-based
> vulnerabilities. Software analysis tools can detect many instances of memory
> management issues and operating environment options can also provide some
> protection, but inherent protections offered by memory safe software
> languages can
> prevent or mitigate most memory management issues. NSA recommends using a
> memory safe language when possible. While the use of added protections
> to non-
> memory safe languages and the use of memory safe languages do not
> provide absolute
> protection against exploitable memory issues, they do provide
> considerable protection.
> Therefore, the overarching software community across the private sector,
> academia,
> and the U.S. Government have begun initiatives to drive the culture of
> software
> development towards utilizing memory safe languages.
> </quote>
>
> <quote>
> Using a memory safe language can help prevent programmers from
> introducing certain
> types of memory-related issues. Memory is managed automatically as part
> of the
> computer language; it does not rely on the programmer adding code to
> implement
> memory protections. The language institutes automatic protections using
> a combination
> of compile time and runtime checks. These inherent language features
> protect the
> programmer from introducing memory management mistakes unintentionally.
> Examples
> of memory safe language include C#, Go, Java, Ruby™, Rust, and Swift.
> </quote>
>
> Arne
>
> PS: Only Java and Ruby are currently available on VMS.

Functional languages?

What about the use of a specification language such as TLA+?

Seems there is a lot of things we can do to push for better software outcomes

Re: NSA on programming languages

<tl05vr$22plt$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=25635&group=comp.os.vms#25635

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: club...@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: Re: NSA on programming languages
Date: Tue, 15 Nov 2022 13:59:24 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 27
Message-ID: <tl05vr$22plt$1@dont-email.me>
References: <tkmuqj$tb7$1@gioia.aioe.org> <tku2f2$1qf7b$2@dont-email.me> <tkuadv$1rahv$1@dont-email.me>
Injection-Date: Tue, 15 Nov 2022 13:59:24 -0000 (UTC)
Injection-Info: reader01.eternal-september.org; posting-host="40026180dff3d03f3bb2edcba2fd7138";
logging-data="2188989"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+u2tZC/o/QFMPWVqzsaqIi243aeNxAoXM="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:Vafsb/LpoyKQnW1w10f0uewItxg=
 by: Simon Clubley - Tue, 15 Nov 2022 13:59 UTC

On 2022-11-14, Stephen Hoffman <seaohveh@hoffmanlabs.invalid> wrote:
> On 2022-11-14 18:46:59 +0000, Simon Clubley said:
>> On a related note, I've just found out today that NVIDIA have made a
>> _very_ interesting decision with regards to moving towards using a
>> safer programming language:
>>
>> https://developers.slashdot.org/story/22/11/13/010222/nvidia-security-team-what-if-we-just-stopped-using-c
>>
>>
>> I wonder if they will be a one-off or if more organisations will follow ?
>
> There have been other organizations making a similar shift.
>
> And it gets easier. Rust kernel support is now part of Linux.
><https://docs.kernel.org/rust/index.html>
>

Oh, it's _not_ Rust that NVIDIA are using in the above story. :-)

The choice here is MUCH more interesting. Still wondering if it will
be a one-off however or a sign of something more to come elsewhere.

Simon.

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.

Re: NSA on programming languages

<tl1cbf$17k6$1@gioia.aioe.org>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=25649&group=comp.os.vms#25649

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!aioe.org!LeVffQP25j5GAigzc2gaQA.user.46.165.242.75.POSTED!not-for-mail
From: arn...@vajhoej.dk (Arne Vajhøj)
Newsgroups: comp.os.vms
Subject: Re: NSA on programming languages
Date: Tue, 15 Nov 2022 19:54:05 -0500
Organization: Aioe.org NNTP Server
Message-ID: <tl1cbf$17k6$1@gioia.aioe.org>
References: <tkmuqj$tb7$1@gioia.aioe.org>
<a777d667-6388-46bb-b9ae-8ea1fd832376n@googlegroups.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Info: gioia.aioe.org; logging-data="40582"; posting-host="LeVffQP25j5GAigzc2gaQA.user.gioia.aioe.org"; mail-complaints-to="abuse@aioe.org";
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:102.0) Gecko/20100101
Thunderbird/102.4.2
X-Notice: Filtered by postfilter v. 0.9.2
Content-Language: en-US
 by: Arne Vajhøj - Wed, 16 Nov 2022 00:54 UTC

On 11/15/2022 5:34 AM, IanD wrote:
> On Saturday, November 12, 2022 at 1:01:58 PM UTC+11, Arne Vajhøj wrote:
>> https://media.defense.gov/2022/Nov/10/2003112742/-1/-1/0/CSI_SOFTWARE_MEMORY_SAFETY.PDF
>>
>> National Security Agency | Cybersecurity Information Sheet
>> Software Memory Safety
>>
>> <quote>
....
>> Examples
>> of memory safe language include C#, Go, Java, Ruby™, Rust, and Swift.
>> </quote>

>> PS: Only Java and Ruby are currently available on VMS.
>
> Functional languages?

> Seems there is a lot of things we can do to push for better software outcomes

FP centric languages and FP centric applications seems
to be very rare.

Most languages today has some FP support, but mostly used
to pass lambdas to list processing methods and similar,
which I consider convenience not FP centric.

Arne

Re: NSA on programming languages

<tncntf$q31$1@reader2.panix.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=25853&group=comp.os.vms#25853

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!panix!.POSTED.spitfire.i.gajendra.net!not-for-mail
From: cro...@spitfire.i.gajendra.net (Dan Cross)
Newsgroups: comp.os.vms
Subject: Re: NSA on programming languages
Date: Wed, 14 Dec 2022 14:51:27 -0000 (UTC)
Organization: PANIX Public Access Internet and UNIX, NYC
Message-ID: <tncntf$q31$1@reader2.panix.com>
References: <tkmuqj$tb7$1@gioia.aioe.org> <tku2f2$1qf7b$2@dont-email.me> <tkuadv$1rahv$1@dont-email.me>
Injection-Date: Wed, 14 Dec 2022 14:51:27 -0000 (UTC)
Injection-Info: reader2.panix.com; posting-host="spitfire.i.gajendra.net:166.84.136.80";
logging-data="26721"; mail-complaints-to="abuse@panix.com"
X-Newsreader: trn 4.0-test77 (Sep 1, 2010)
Originator: cross@spitfire.i.gajendra.net (Dan Cross)
 by: Dan Cross - Wed, 14 Dec 2022 14:51 UTC

In article <tkuadv$1rahv$1@dont-email.me>,
Stephen Hoffman <seaohveh@hoffmanlabs.invalid> wrote:
>[snip]
>As for other languages for that list, Google have added Carbon
><https://github.com/carbon-language/carbon-lang>, so we'll see how that
>works out.

Carbon is not particulary safe; they decided to take the
approach of "putting in safety after the fact", which seems like
a goal that will be difficult to realize.

>This C-to-Rust transpiler looks like fun, not that I'd be in a rush to
>push the resulting (unsafe) Rust code into production:
><https://github.com/immunant/c2rust>

I think the idea here is that you get it building with the Rust
compiler, avoiding the FFI barrier, and then you can start
wrapping it in a safe interface and then slowly rewrite it in
safe Rust.

>As for transpiling or rewriting more generally, few places will go to
>the effort of replacing the existing C or C++ code—or the existing
>BLISS or Macro32 code, for that matter—to anything else. Not past
>incremental work and updates, or replacement when substantial updates
>are needed, or other issues arise. Issues such as when one vendor was
>replacing their existing Ada code due to (a lack of) compiler support
>on the target platform.

The whole idea of Carbon is to give you transpiling from
idiomatic C++ to idiomatic Carbon; you get improved syntax and
so forth, and they can address a subset of C++ bugs that way.

Whether anyone other than Google adopts it remains to be seen
(disclaimer: I saw early versions of the spec when I was at
Google. It was hard then to imagine how Carbon would compete
against mature Rust and Swift ecosystems, and even harder now.
Their main selling point seems to be good compatibility with
large, existing C++ code bases, which Google certainly has).

- Dan C.

Re: NSA on programming languages

<trj2q8$1epoa$3@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=26464&group=comp.os.vms#26464

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: arn...@vajhoej.dk (Arne Vajhøj)
Newsgroups: comp.os.vms
Subject: Re: NSA on programming languages
Date: Fri, 3 Feb 2023 08:39:19 -0500
Organization: A noiseless patient Spider
Lines: 33
Message-ID: <trj2q8$1epoa$3@dont-email.me>
References: <tkmuqj$tb7$1@gioia.aioe.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Fri, 3 Feb 2023 13:39:20 -0000 (UTC)
Injection-Info: reader01.eternal-september.org; posting-host="fb0a294d8bc1d1e2b97ffc766b304e49";
logging-data="1533706"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX197ngcB3NIlH9l8xNogxgHIACelo9RTxQI="
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:102.0) Gecko/20100101
Thunderbird/102.7.0
Cancel-Lock: sha1:3Nu1nRXpso9W3KdnVZ72VBI7kos=
Content-Language: en-US
In-Reply-To: <tkmuqj$tb7$1@gioia.aioe.org>
 by: Arne Vajhøj - Fri, 3 Feb 2023 13:39 UTC

On 11/11/2022 9:01 PM, Arne Vajhøj wrote:
> https://media.defense.gov/2022/Nov/10/2003112742/-1/-1/0/CSI_SOFTWARE_MEMORY_SAFETY.PDF
>
> National Security Agency | Cybersecurity Information Sheet
> Software Memory Safety

> <quote>
> Commonly used languages, such as C and C++, provide a lot of freedom and
> flexibility
> in memory management while relying heavily on the programmer to perform
> the needed
> checks on memory references. Simple mistakes can lead to exploitable
> memory-based
> vulnerabilities.
....
> Using a memory safe language can help prevent programmers from
> introducing certain
> types of memory-related issues. Memory is managed automatically as part
> of the
> computer language; it does not rely on the programmer adding code to
> implement
> memory protections. The language institutes automatic protections using
> a combination
> of compile time and runtime checks. These inherent language features
> protect the
> programmer from introducing memory management mistakes unintentionally.

Bjarne has replied to NSA:

https://www.open-std.org/jtc1/sc22/wg21/docs/papers/2023/p2739r0.pdf

Arne

1
server_pubkey.txt

rocksolid light 0.9.8
clearnet tor