TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Libtls – New TLS API from LibreSSL

143 pointsby calineczkaover 10 years ago

11 comments

alexchamberlainover 10 years ago
Not sure the trade off line has been drawn in the correct place here. TLS should be implemented as a filter; the world isn't limited to files and (blocking) sockets. What about integration with event loops, for example? How does one test this API?
评论 #8572303 未加载
评论 #8573879 未加载
评论 #8572936 未加载
评论 #8573262 未加载
评论 #8572505 未加载
评论 #8573023 未加载
评论 #8573662 未加载
评论 #8572938 未加载
parleyover 10 years ago
Please correct me if I&#x27;m wrong, but I believe that the OpenSSL API allows one to implement the actual transport of the TLS protected data however one chooses, although it provides convenient socket&#x2F;fd transports. Is this a possibility with this new API? Regardless of whether OpenSSL can do it today, I consider this a very valuable feature and allows for more flexible composition of the TLS implementation and the rest of the system.<p>Edit: Grammar.
评论 #8572592 未加载
评论 #8572192 未加载
cremnoover 10 years ago
This isn&#x27;t a standalone implementation (yet [1]). It&#x27;s a sane wrapper around OpenSSL&#x27;s less sane libssl API.<p>[1] <a href="https://marc.info/?l=openbsd-tech&amp;m=141524972826918&amp;w=2" rel="nofollow">https:&#x2F;&#x2F;marc.info&#x2F;?l=openbsd-tech&amp;m=141524972826918&amp;w=2</a>
评论 #8572186 未加载
评论 #8572168 未加载
vogover 10 years ago
To better understand the basic reasoning behind this API, I recommend to read the last section (&quot;ressl&quot;) of:<p>&quot;LibreSSL: More Than 30 Days Later&quot;<p><a href="http://www.openbsd.org/papers/eurobsdcon2014-libressl.html" rel="nofollow">http:&#x2F;&#x2F;www.openbsd.org&#x2F;papers&#x2F;eurobsdcon2014-libressl.html</a>
评论 #8572594 未加载
tedunangstover 10 years ago
It&#x27;s probably still early to be using this, unless it&#x27;s of particular interest (interest is encouraged, of course!). There&#x27;s a reason the server API isn&#x27;t documented, for example.
评论 #8574055 未加载
rlpbover 10 years ago
How does one poll for socket activity using this API, given that a read on a socket doesn&#x27;t necessarily mean that decrypted data is available, and yet that socket writes may be required?
teddyhover 10 years ago
Other TLS libraries tend to have an OpenSSL compatibility layer. Now here’s yet <i>another</i> API for them to write compatibility layers for. This is a bad trend.<p>I’m thinking that there ought to be an API defined by an IETF working group and specified in an RFC (like the IPv6 API C interface is), with obvious room for expansion for library-specific features. Then all TLS libraries could implement <i>that</i> API and end the madness.<p>INB4 xkcd 927: <a href="https://xkcd.com/927/" rel="nofollow">https:&#x2F;&#x2F;xkcd.com&#x2F;927&#x2F;</a>
nlyover 10 years ago
Do the defaults strike the best balance between security, PFS and compatibility? Because I think that&#x27;s really the problem with the TLS libraries I&#x27;ve used, and introducing a new API is a good opportunity to fix that. What happens, for example, if I don&#x27;t call tls_config_set_ciphers()?
evilpieover 10 years ago
Host and cert verification by default is good. You can use tls_config_set_ciphers to set a cipher string, but I don&#x27;t see if they disable unsafe ciphers by default.
edwintorokover 10 years ago
Does this API perform OCSP checks?
评论 #8573309 未加载
dicroceover 10 years ago
That looks very nice.