TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Boring SSL

161 点作者 FredericJ将近 11 年前

8 条评论

mben将近 11 年前
Theo&#x27;s opinion about BoringSSL and LibreSSL portability: <a href="http://article.gmane.org/gmane.os.openbsd.tech/37174" rel="nofollow">http:&#x2F;&#x2F;article.gmane.org&#x2F;gmane.os.openbsd.tech&#x2F;37174</a>
matteotom将近 11 年前
So from what I understand, Google has a bunch of OpenSSL patches they use. They used to re-apply those patches to each new OpenSSL release, but now they&#x27;re going to keep their own branch (BoringSSL) and pull and merge changes from OpenSSL?<p>What are the costs&#x2F;benifits of one method over the other?
评论 #7922867 未加载
评论 #7922989 未加载
borando将近 11 年前
Great news! Hopefully between LibreSSL and BoringSSL, OpenSSL will go away and never return. I think AGL and the LibreSSL team will be able to do some fantastic informal collaboration. I&#x27;m looking forward to a healthy TLS ecosystem.
评论 #7924159 未加载
fiatmoney将近 11 年前
How, if at all, is this envisioned to interact with the work going on in LibreSSL?<p>I realize LibreSSL is optimized for BSD and Google is primarily Linux, but it seems silly to fork the code in 2 different directions.
评论 #7923011 未加载
评论 #7923294 未加载
评论 #7923305 未加载
评论 #7923017 未加载
评论 #7923065 未加载
AlyssaRowan将近 11 年前
Makes a hell of a lot more sense than rebasing 70-odd separate patches for your internal use! Making LibReSSL-portable is a good goal, and this work can be used to improve both (and OpenSSL, too - some of this found its way into the OpenSSL 1.2 branch).<p>I think the &quot;safe&quot; (EC)DSA nonce implementation is interesting but could use some review, and I&#x27;ve communicated that to the author: it&#x27;s not as good as the proposal in RFC6979[1] (which uses HMAC_DRBG - which is good - to generate a truly deterministic DSA nonce, with test vectors and everything!). In particular, BN_generate_dsa_nonce from these patches uses modular reduction down into the prime order, which has a small bias towards 0 of course. The NIST prime orders aren&#x27;t as close to powers of two as you might like to get away with that, and if I&#x27;m being honest, I&#x27;m not sure you can get away with <i>anything</i> with (EC)DSA - it is extraordinarily fragile in a way I think was always deliberate. The practical impact is probably limited, but I really don&#x27;t want to take any chances there. (Ideally I&#x27;d want Ed25519, or something very like it - there really ought to be some more discussion on CFRG about that - although it&#x27;s going to be quite some time before anyone can roll it out in certificates widely.)<p>Right now, it&#x27;s still lipstick on a pig. OpenSSL is hairy as fuck. Long-term, I think the LibReSSL cleanup-via-demolition approach and then carefully rebuilding what&#x27;s left over is what&#x27;s needed. But I&#x27;m not sure I&#x27;d want to run LibReSSL in the middle of such fundamental reworking - and in the meantime, some of these patches look quite familiar to me. :) ___ 1. <a href="https://tools.ietf.org/html/rfc6979" rel="nofollow">https:&#x2F;&#x2F;tools.ietf.org&#x2F;html&#x2F;rfc6979</a> - Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA)
评论 #7926125 未加载
alanh将近 11 年前
Moderators: Name should be BoringSSL, not Boring SSL. It is the tentative name of Google’s OpenSSL fork.
评论 #7923939 未加载
peterwwillis将近 11 年前
Yet another vendor implementation, yet more divergent behavior to be expected...
评论 #7923001 未加载
评论 #7925753 未加载
Istof将近 11 年前
offtopic... that is a pretty bad custom font (might as well stay with the defaults)
评论 #7923299 未加载
评论 #7923189 未加载
评论 #7923274 未加载