TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Cryptographic Agility (2016)

1 pointsby erwanover 5 years ago

1 comment

erwanover 5 years ago
&gt;There&#x27;s a lesson in all this: have one joint and keep it well oiled.<p>&gt;Protocol designers underestimate how badly people will implement their designs. Writing down how you think it should work and hoping that it&#x27;ll work, doesn&#x27;t work. TLS&#x27;s protocol negotiation is trivial and the specification is clear, yet it still didn&#x27;t work in practice because it&#x27;s difficult to oil.<p>&gt;Rather one needs to minimise complexity, concentrate all extensibility in a single place and actively defend it. An active defense can take many forms: fuzzing the extensibility system in test suites and compliance testing is good. You might want to define and implement dummy extensions once a year or such, and retire old ones on a similar schedule. When extensions contain lists of values, define a range of values that clients insert at random. In short, be creative otherwise you&#x27;ll find that bug rust will quickly settle in.