TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Preparing Rustls for Wider Adoption

230 点作者 jaas大约 4 年前

7 条评论

orra大约 4 年前
It took me a minute to work out who &#x27;a better internet&#x27; aka ISRG are. It&#x27;s the folk behind Let&#x27;s Encrypt. That&#x27;s cool.<p>Anyway, this sounds great to me. I&#x27;m not a huge fan of memory unsafe languages, especially for critical code.
评论 #26886404 未加载
senkora大约 4 年前
How does this compare to the verified TLS implementation from Project Everest?<p><a href="https:&#x2F;&#x2F;project-everest.github.io&#x2F;" rel="nofollow">https:&#x2F;&#x2F;project-everest.github.io&#x2F;</a><p><a href="https:&#x2F;&#x2F;mitls.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;mitls.org&#x2F;</a>
评论 #26877442 未加载
dochtman大约 4 年前
Happy to answer any questions that come up!
评论 #26876435 未加载
评论 #26876457 未加载
评论 #26876458 未加载
评论 #26876462 未加载
评论 #26877240 未加载
评论 #26877562 未加载
weinzierl大约 4 年前
Rustls is really cool. I came to it because one of my projects used a library that in turn (by default) used OpenSSL. After much tinkering and not getting OpenSSL play well on that particular system I switched to Rustls and it worked out of the box and like a charm.<p>That being said and from what I understand Rustls is not a drop in replacement and it is not that easy for all Rust libraries which use TLS.<p>Which brings me to the point that I think a big leap forward for wider Rustls adoption in the Rust world itself would be to make it easily usable with all popular and widely used Rust libraries that depend on a TLS implementation.<p>What I would like to see is sort of a global (not per dependency)<p><pre><code> features = [&quot;rustls-tls&quot;] </code></pre> so that all libraries and their dependencies use Rustls automatically and OpenSSL is completely out of the picture. I know that this is not on Rustls alone but on the library writers too, but still it would be really cool to switch the TLS implementation like that.<p>Then we could even dream to make Rustls the default and use OpenSSL (or one of its relatives) only if need be.
评论 #26877160 未加载
评论 #26877538 未加载
评论 #26877302 未加载
est31大约 4 年前
Back when rustls was initially announced, people criticized how few ciphersuites it supported, like only TLS1.3 and parts of TLS 1.2. Not sure, I might have been among them. And it still doesn&#x27;t support TLS 1.1 or TLS 1.0. But since then, browsers have dropped support for many of those ciphersuites, so it&#x27;s far less interesting to implement support for them at this point.
评论 #26877590 未加载
zelly大约 4 年前
Rustls is still not formally verified. It may not have memory errors, but there are a lot of other security errors besides just that (and there may be more of them since it hasn&#x27;t been used as much as open|boringssl has been used). It&#x27;s a slight improvement at best.<p>Ideally you want a formally verified SPARK or CompCert C implementation of TLS, but those are not open sores compilers so they won&#x27;t fly.
评论 #26883625 未加载
评论 #26883733 未加载
评论 #26883526 未加载
Vogtinator大约 4 年前
Does it allow building as a completely shared library? If not, everything using it will have to be rebuilt from scratch on each update, which is highly annoying and a security issue on its own IMO. Apparently it has a Rust API, so it&#x27;s probably unlikely.
评论 #26884572 未加载
评论 #26879753 未加载