TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

OpenSSL 3 Strategic Architecture

69 pointsby jbaviatabout 6 years ago

5 comments

zdwabout 6 years ago
The OpenSSL strategy seems to be to try to leapfrog LibreSSL in terms of version numbers (which already has released a 2.x branch, hence their 3.x versioning), and revise their API, but still have considerable complexity.<p>The LibreSSL approach was to write a new library and API, libtls, which does away with the substantial configuration complexity in applications: <a href="https:&#x2F;&#x2F;man.openbsd.org&#x2F;tls_init.3" rel="nofollow">https:&#x2F;&#x2F;man.openbsd.org&#x2F;tls_init.3</a><p>I&#x27;d argue that LibreSSL&#x27;s is the better approach.
评论 #19289965 未加载
tptacekabout 6 years ago
<i>The Core will implement a property based look-up feature for finding algorithms, e.g. it might allow you find an algorithm where &quot;fips=true&quot;, or &quot;keysize=128, constant_time=true&quot;.</i><p>Why? What designer builds a system this way, without knowing precisely what algorithm they&#x27;re using?
评论 #19290320 未加载
评论 #19290142 未加载
tatersolidabout 6 years ago
Yikes. Backwards compatibility is tough.<p>Strange that with the bump to 3.0 they didn’t at least announce the removal legacy primitives and TLS versions. Are they going to support DES and RC4 forever?
评论 #19290578 未加载
评论 #19289460 未加载
snvzzabout 6 years ago
Still prefer libressl. A shame that openssl&#x27;s history of failing at security is rewarded with donations and use, rather than shunned.
评论 #19288514 未加载
评论 #19288712 未加载
briansabout 6 years ago
Neat. I look forward to better FIPS handling and the deprecation story.<p>And to vulnerabilities from the loadable module support. Getting the property based binding right looks tough!