TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Boring SSL

161 pointsby FredericJalmost 11 years ago

8 comments

mbenalmost 11 years ago
Theo&#x27;s opinion about BoringSSL and LibreSSL portability: <a href="http://article.gmane.org/gmane.os.openbsd.tech/37174" rel="nofollow">http:&#x2F;&#x2F;article.gmane.org&#x2F;gmane.os.openbsd.tech&#x2F;37174</a>
matteotomalmost 11 years ago
So from what I understand, Google has a bunch of OpenSSL patches they use. They used to re-apply those patches to each new OpenSSL release, but now they&#x27;re going to keep their own branch (BoringSSL) and pull and merge changes from OpenSSL?<p>What are the costs&#x2F;benifits of one method over the other?
评论 #7922867 未加载
评论 #7922989 未加载
borandoalmost 11 years ago
Great news! Hopefully between LibreSSL and BoringSSL, OpenSSL will go away and never return. I think AGL and the LibreSSL team will be able to do some fantastic informal collaboration. I&#x27;m looking forward to a healthy TLS ecosystem.
评论 #7924159 未加载
fiatmoneyalmost 11 years ago
How, if at all, is this envisioned to interact with the work going on in LibreSSL?<p>I realize LibreSSL is optimized for BSD and Google is primarily Linux, but it seems silly to fork the code in 2 different directions.
评论 #7923011 未加载
评论 #7923294 未加载
评论 #7923305 未加载
评论 #7923017 未加载
评论 #7923065 未加载
AlyssaRowanalmost 11 years ago
Makes a hell of a lot more sense than rebasing 70-odd separate patches for your internal use! Making LibReSSL-portable is a good goal, and this work can be used to improve both (and OpenSSL, too - some of this found its way into the OpenSSL 1.2 branch).<p>I think the &quot;safe&quot; (EC)DSA nonce implementation is interesting but could use some review, and I&#x27;ve communicated that to the author: it&#x27;s not as good as the proposal in RFC6979[1] (which uses HMAC_DRBG - which is good - to generate a truly deterministic DSA nonce, with test vectors and everything!). In particular, BN_generate_dsa_nonce from these patches uses modular reduction down into the prime order, which has a small bias towards 0 of course. The NIST prime orders aren&#x27;t as close to powers of two as you might like to get away with that, and if I&#x27;m being honest, I&#x27;m not sure you can get away with <i>anything</i> with (EC)DSA - it is extraordinarily fragile in a way I think was always deliberate. The practical impact is probably limited, but I really don&#x27;t want to take any chances there. (Ideally I&#x27;d want Ed25519, or something very like it - there really ought to be some more discussion on CFRG about that - although it&#x27;s going to be quite some time before anyone can roll it out in certificates widely.)<p>Right now, it&#x27;s still lipstick on a pig. OpenSSL is hairy as fuck. Long-term, I think the LibReSSL cleanup-via-demolition approach and then carefully rebuilding what&#x27;s left over is what&#x27;s needed. But I&#x27;m not sure I&#x27;d want to run LibReSSL in the middle of such fundamental reworking - and in the meantime, some of these patches look quite familiar to me. :) ___ 1. <a href="https://tools.ietf.org/html/rfc6979" rel="nofollow">https:&#x2F;&#x2F;tools.ietf.org&#x2F;html&#x2F;rfc6979</a> - Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA)
评论 #7926125 未加载
alanhalmost 11 years ago
Moderators: Name should be BoringSSL, not Boring SSL. It is the tentative name of Google’s OpenSSL fork.
评论 #7923939 未加载
peterwwillisalmost 11 years ago
Yet another vendor implementation, yet more divergent behavior to be expected...
评论 #7923001 未加载
评论 #7925753 未加载
Istofalmost 11 years ago
offtopic... that is a pretty bad custom font (might as well stay with the defaults)
评论 #7923299 未加载
评论 #7923189 未加载
评论 #7923274 未加载