fosstodon.org is one of the many independent Mastodon servers you can use to participate in the fediverse.
Fosstodon is an invite only Mastodon instance that is open to those who are interested in technology; particularly free & open source software. If you wish to join, contact us for an invite.

Administered by:

Server stats:

9.8K
active users

#boringssl

1 post1 participant0 posts today
Matt "msw" Wilson<p>“AWS-LC looks like a very active project with a strong community. […] Even the recently reported performance issue was quickly fixed and released with the next version. […] This is definitely a library that anyone interested in the topic should monitor.”</p><p><a href="https://mstdn.social/tags/OpenSSL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSSL</span></a> <a href="https://mstdn.social/tags/BoringSSL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BoringSSL</span></a> <a href="https://mstdn.social/tags/WolfSSL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WolfSSL</span></a> <a href="https://mstdn.social/tags/AWSLC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AWSLC</span></a> <a href="https://mstdn.social/tags/HAProxy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HAProxy</span></a> <a href="https://mstdn.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a> <a href="https://mstdn.social/tags/FreeSoftware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeSoftware</span></a> <a href="https://mstdn.social/tags/FOSS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FOSS</span></a> <a href="https://mstdn.social/tags/OSS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSS</span></a> <a href="https://mstdn.social/tags/TLS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TLS</span></a> <a href="https://mstdn.social/tags/QUIC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>QUIC</span></a><br><a href="https://www.haproxy.com/blog/state-of-ssl-stacks" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">haproxy.com/blog/state-of-ssl-</span><span class="invisible">stacks</span></a></p>
Alexander Hansen Færøy<p>Trying out the Post-Quantum TLS feature (called ML-KEM) in <a href="https://mastodon.social/tags/OpenSSL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSSL</span></a> 3.5-beta1 and <a href="https://mastodon.social/tags/Tor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tor</span></a> was a success! 🥳</p><p>The experiment is using the same setup as we did with <a href="https://mastodon.social/tags/BoringSSL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BoringSSL</span></a> back when they enabled the Kyber768/x25519 TLS 1.3 group: we use a Tor binary, compiled against a PQC-enabled lib(ssl|crypto), to run a Bridge Server locally and connect a local Bridge Client to the server.</p><p>The branch used for this experiment is available from <a href="https://gitlab.torproject.org/ahf/tor/-/commits/ahf/openssl-3.5-pqc-experiments" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gitlab.torproject.org/ahf/tor/</span><span class="invisible">-/commits/ahf/openssl-3.5-pqc-experiments</span></a></p>
Pirate Praveen<p><a href="https://social.masto.host/tags/GNOME" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GNOME</span></a> Web is truly independent from <a href="https://social.masto.host/tags/Google" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Google</span></a>. Though still dependent on <a href="https://social.masto.host/tags/Apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apple</span></a>, they don't have as much power as Google. It is still better than a Google monopoly. And <a href="https://social.masto.host/tags/webkit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>webkit</span></a> is developed with proper APIs and meant to be embedded in other applications unlike Google's <a href="https://social.masto.host/tags/blink" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blink</span></a>.</p><p>One big feature missing is support for audio / video calls (webrtc). With <a href="https://social.masto.host/tags/BoringSSL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BoringSSL</span></a> switching to Apache 2.0, a big blocker for webrtc support is resolved.</p><p><a href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1101132" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">bugs.debian.org/cgi-bin/bugrep</span><span class="invisible">ort.cgi?bug=1101132</span></a></p><p><a href="https://social.masto.host/tags/mozilla" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mozilla</span></a> <a href="https://social.masto.host/tags/firefox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firefox</span></a> <a href="https://social.masto.host/tags/epiphany" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>epiphany</span></a></p>
Erik C. Thauvin<p>Rustls Multi-Threaded Performance Is Battering OpenSSL</p><p><a href="https://mastodon.social/tags/boringssl" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>boringssl</span></a> <a href="https://mastodon.social/tags/openssl" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openssl</span></a> <a href="https://mastodon.social/tags/rustlang" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rustlang</span></a> <a href="https://mastodon.social/tags/ssl" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssl</span></a> <a href="https://mastodon.social/tags/tls" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tls</span></a></p><p><a href="https://www.phoronix.com/news/Rustls-Multi-Threading-Perf?utm_medium=erik.in&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">phoronix.com/news/Rustls-Multi</span><span class="invisible">-Threading-Perf?utm_medium=erik.in&amp;utm_source=mastodon</span></a></p>
ricardo :mastodon:<p>Rust-Written <a href="https://fosstodon.org/tags/Rustls" class="mention hashtag" rel="tag">#<span>Rustls</span></a> Now Reportedly Outperforming <a href="https://fosstodon.org/tags/OpenSSL" class="mention hashtag" rel="tag">#<span>OpenSSL</span></a> &amp; <a href="https://fosstodon.org/tags/BoringSSL" class="mention hashtag" rel="tag">#<span>BoringSSL</span></a> </p><p><a href="https://www.phoronix.com/news/Rustls-Faster-Than-OpenSSL" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">phoronix.com/news/Rustls-Faste</span><span class="invisible">r-Than-OpenSSL</span></a></p>
Sami Lehtinen<a class="hashtag" href="https://pleroma.envs.net/tag/chrome" rel="nofollow noopener noreferrer" target="_blank">#Chrome</a> and <a class="hashtag" href="https://pleroma.envs.net/tag/boringssl" rel="nofollow noopener noreferrer" target="_blank">#BoringSSL</a> now supports ML-KEM PQ <a class="hashtag" href="https://pleroma.envs.net/tag/cryptography" rel="nofollow noopener noreferrer" target="_blank">#cryptography</a>: <a href="https://security.googleblog.com/2024/09/a-new-path-for-kyber-on-web.html" rel="nofollow noopener noreferrer" target="_blank">https://security.googleblog.com/2024/09/a-new-path-for-kyber-on-web.html</a> kw: hybrid post-quantum key exchange, <a class="hashtag" href="https://pleroma.envs.net/tag/https" rel="nofollow noopener noreferrer" target="_blank">#HTTPS</a>, <a class="hashtag" href="https://pleroma.envs.net/tag/tls" rel="nofollow noopener noreferrer" target="_blank">#TLS</a>, Kyber
sdk<p>I'm looking for a document that describes the reaction of OpenSSL after Heartbleed until recent years. What has happened? Redesign? Refactorings?</p><p>Is OpenSSL 3 a designed in a better way? Or is it still the dumpster fire it once was?</p><p><a href="https://bsd.network/tags/openssl" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openssl</span></a> <a href="https://bsd.network/tags/libressl" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>libressl</span></a> <a href="https://bsd.network/tags/boringssl" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>boringssl</span></a> <a href="https://bsd.network/tags/hearbleed" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hearbleed</span></a> </p><p>EDIT: I'm looking for a summary, not a wealth of change logs and commits.</p>
Björn<p><span class="h-card" translate="no"><a href="https://fosstodon.org/@birnim" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>birnim</span></a></span> I developed an app using <a href="https://mastodon.social/tags/pyqtdeploy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pyqtdeploy</span></a> and <a href="https://mastodon.social/tags/Kirigami" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Kirigami</span></a> a few years ago.<br>One limitation I noticed that however which Python Qt API limits you to access Qt's Android API's<br>that you have to use because of Android's interaction with files.<br>In general you are more limited when having to call Java API's.<br>The other thing was that Androids <a href="https://mastodon.social/tags/openssl" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openssl</span></a> fork <a href="https://mastodon.social/tags/boringssl" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>boringssl</span></a> was a limitation if your Qt is build with<br>openssl.<br>A smaller issue was to setup scripts for building and bootstrapping.</p>
ronin3510 :donor: 🛰️<p>GitHub - jedisct1/openssl-family-bench: A quick benchmark of {Open,Libre,Boring}SSL by <span class="h-card"><a href="https://beta.birdsite.live/users/jedisct1" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>jedisct1</span></a></span> </p><p><a href="https://github.com/jedisct1/openssl-family-bench" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/jedisct1/openssl-fa</span><span class="invisible">mily-bench</span></a> </p><p><a href="https://infosec.exchange/tags/OpenSSL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSSL</span></a> <a href="https://infosec.exchange/tags/LibreSSL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LibreSSL</span></a> <a href="https://infosec.exchange/tags/BoringSSL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BoringSSL</span></a> <a href="https://infosec.exchange/tags/benchmark" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>benchmark</span></a> <a href="https://infosec.exchange/tags/ciphers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ciphers</span></a></p>