Search
Items tagged with: OpenSSL
Three years ago I blogged about #OpenSSL's decision to deliberately block #QUIC progress in the world: daniel.haxx.se/blog/2021/10/25…
Which is timely with the OpenSSL 3.4.0 release announced just days ago: that still does not offer a working (and performant) QUIC API. (yes, there is an attempt there but it's not production grade)
It's almost like the writing was on the wall already a long time ago.
The QUIC API OpenSSL will not provide
In a world that is now gradually adopting HTTP/3 (which, as you know, is implemented over QUIC), the problem with the missing API for QUIC is still a key problem.daniel.haxx.se
Since #openssl does not seem to fix any of the remaining #QUIC API problems in their upcoming 3.4 release, it will keep lagging behind.
openssl-library.org/post/2024-…
OpenSSL 3.4 Alpha release approaching
The freeze date for OpenSSL 3.4 Alpha is rapidly approaching. Alpha freeze approaching The freeze date for OpenSSL 3.4 Alpha is rapidly approaching. Planned features are viewable on our 3.4 Planning page.Library
According to @bagder the stubborn way the #OpenSSL project is handling #QUIC implementation is directly responsible for delaying HTTP/3 adoption (1), and I tend to agree. When the project rejected the community QUIC patches and decided to go with their own design, it wasn't difficult to predict problems. This was proven right by the massive feature gaps (2) and performance issues (3) discovered by @icing when trying to marry OpenSSL QUIC to #curl. Even with API fixes released in version 3.3 the implementation is still inferior, and there is no good solution in sight.
1) lwn.net/Articles/983380/
2) github.com/openssl/openssl/dis…
3) github.com/icing/blog/blob/mai…
blog/curl-h3-performance.md at main · icing/blog
Contribute to icing/blog development by creating an account on GitHub.GitHub
CVE-2024-5535 is an #OpenSSL problem that cannot be triggered by #curl
OpenSSL calls it it a low severity flaw. openssl.org/news/vulnerabiliti…
GitHub lists it as "critical" at 9.1 out of 10: github.com/advisories/GHSA-4fc…
Why is #curl with #openssl + #nghttp3 still experimental?
github.com/curl/curl/discussio…
Why openssl + nghttp3 is still experimental? · curl curl · Discussion #13820
Why openssl + nghttp3 is still experimental?GitHub
There are TLS servers that don't send the required close_notify alert message in certain conditions. #Google web servers do this if they think the that recipient isn't interested about the message body and no connection keep alive is set. Examples of such connections would be requests that end up with 0 byte message body while:
• HTTP/1.0 without "Connection: keep-alive" header or
• HTTP/1.1 with "Connection: close" header
This can cause some complications since #OpenSSL 3 defaults to erroring out if the close_notify is missing.
SSL_OP_IGNORE_UNEXPECTED_EOF option was added to enable talking to these non-compliant servers. Enabling this option removes truncation attack protection - so this option should really only be used when absolutely necessary. However, unless if you control the servers being talked to, you probably need to enable this option for now.
So why does Google terminate connections without close_notify? Likely it is done to save some resources when tearing down TLS connections. If you have billions of connections going on all the time, even some small savings add up quickly.
github.com/php/php-src/issues/…
OpenSSL 3: Support of SSL_OP_IGNORE_UNEXPECTED_EOF context option · Issue #8369 · php/php-src
Description OpenSSL became more strict about unexpected EOF (not sending close notify) in 1.1.1e but reverted that change in 1.1.1f due to the huge amount of non-compliant servers. With the new maj...GitHub
Building #curl using #OpenSSL 3.2 #QUIC?
github.com/curl/curl/discussio…
Building libcurl using OpenSSL 3.2 QUIC? · curl/curl · Discussion #12425
Hello, are there any plans to build libcurl with OpenSSL v3.2's new QUIC API? OpenSSL v3.2 was officially released 11/23 (which supports QUIC client capabilities). In this way, libcurl doesn't need...GitHub
Quick set up guide for Encrypted Client Hello (ECH)
The Encrypted Client Hello (ECH) mechanism draft-spec is a way to plug a few privacy-holes that remain in the Transport Layer Security (TLS) protocol that’s used as the security layer for the web.jochensp (https://guardianproject.info)
The "#OpenSSL situation" will still make it tricky for ordinary people to enable HTTP/3.
As I blogged already two years ago: daniel.haxx.se/blog/2021/10/25…
"The #OpenSSL project really seems to be in a dead end for me, it's incompatible with #QUIC and unfixable performance-wise" / Willy Tarreau
mailarchive.ietf.org/arch/msg/…
Re: QUIC (mostly) on top of OpenSSL without patches
Search IETF mail list archivesmailarchive.ietf.org
„One might wonder how a punycode decoder that overflows on an example string from the RFC makes it into a cryptographic library released in '21.“ #OpenSSL