sueden.social ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Eine Community für alle, die sich dem Süden hingezogen fühlen. Wir können alles außer Hochdeutsch.

Serverstatistik:

1,8 Tsd.
aktive Profile

#openssl

3 Beiträge3 Beteiligte1 Beitrag heute
Guardian Project<p><a href="https://social.librem.one/tags/DEfO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DEfO</span></a> has completed <a href="https://social.librem.one/tags/ECH" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ECH</span></a> implementation for <a href="https://social.librem.one/tags/nginx" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nginx</span></a> and there is a pull request:</p><p><a href="https://github.com/nginx/nginx/pull/840" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/nginx/nginx/pull/84</span><span class="invisible">0</span></a></p><p>If you want to see ECH in nginx sooner rather than later, please jump in and review, give feedback, thumbs up, etc.</p><p><a href="https://social.librem.one/tags/EncryptedClientHello" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EncryptedClientHello</span></a> <a href="https://social.librem.one/tags/TLS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TLS</span></a> <a href="https://social.librem.one/tags/OpenSSL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSSL</span></a></p>
daniel:// stenberg://<p>Is there any reason we should keep support for <a href="https://mastodon.social/tags/OpenSSL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSSL</span></a> &lt; v3 in <a href="https://mastodon.social/tags/curl" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>curl</span></a> ?</p><p><a href="https://curl.se/mail/lib-2025-08/0035.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">curl.se/mail/lib-2025-08/0035.</span><span class="invisible">html</span></a></p>
openSUSE Linux<p>Security &amp; tooling got stronger too! <a href="https://fosstodon.org/tags/vim" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vim</span></a> 9.1.1508 now supports <a href="https://fosstodon.org/tags/Wayland" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wayland</span></a> clipboard &amp; new language syntax, <a href="https://fosstodon.org/tags/myrlyn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>myrlyn</span></a> 0.9.7 improves sudo env handling, and key fixes landed in bind, <a href="https://fosstodon.org/tags/sudo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sudo</span></a>, php8, <a href="https://fosstodon.org/tags/OpenSSL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSSL</span></a>, libxml2, git &amp; more. <a href="https://fosstodon.org/tags/Tumbleweed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tumbleweed</span></a> <a href="https://fosstodon.org/tags/openSUSE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openSUSE</span></a> <a href="https://fosstodon.org/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://news.opensuse.org/2025/08/01/tw-monthly-update-july/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.opensuse.org/2025/08/01/t</span><span class="invisible">w-monthly-update-july/</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://social.glitched.systems/@froge" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>froge</span></a></span> that's a question I'd like to ask <span class="h-card" translate="no"><a href="https://mastodon.social/@mozilla_support" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>mozilla_support</span></a></span> ...</p><ul><li>My assumption is that <a href="https://infosec.space/tags/Mozilla" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mozilla</span></a>'s <a href="https://infosec.space/tags/NSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NSS</span></a> not only supports a shitton of architectures with specific, custom code but also includes the <a href="https://infosec.space/tags/certificates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>certificates</span></a> to trust per default, and those are thousands of CAs with potentially dozens of certificates each...</li></ul><p>AFAIK <a href="https://infosec.space/tags/OpenSSL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSSL</span></a> doesn't ship with any certificates at all...</p>
Nick<p>Some interesting vulnerabilities were patched and <a href="https://infosec.exchange/tags/apache2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>apache2</span></a> has released Apache/2.4.65.</p><p><a href="https://infosec.exchange/tags/SSL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SSL</span></a> <a href="https://infosec.exchange/tags/OpenSSL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSSL</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
Clemens<p>Another commit landed in <a href="https://chaos.social/tags/OpenSSL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSSL</span></a>: <a href="https://github.com/openssl/openssl/commit/6b93db7bfd572e81fac581c5be7b0d7509febb80" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/openssl/openssl/com</span><span class="invisible">mit/6b93db7bfd572e81fac581c5be7b0d7509febb80</span></a></p><p>This time, it's a drive-by thing inspired by <span class="h-card" translate="no"><a href="https://social.wildeboer.net/@jwildeboer" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>jwildeboer</span></a></span> who's working on S/MIME X.509 certificates: the X.509 standards renamed one of the bits in the keyUsage extension from `nonRepudiation` to `contentCommitment`, and OpenSSL only understood the old name.</p><p>Slowly improving the world one commit at a time.</p>
Timo J<p><span class="h-card" translate="no"><a href="https://rattodon.nexus/@rolenthedeep" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>rolenthedeep</span></a></span> I guess I’m in the 1% who doesn’t care what <a href="https://mastodon.online/tags/Apple" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Apple</span></a> does from a UX perspective but would prefer it did a better job keeping <a href="https://mastodon.online/tags/libcurl" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>libcurl</span></a>, <a href="https://mastodon.online/tags/openssl" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openssl</span></a>, and other core libraries up to date.</p>
Richard Levitte<p><span class="h-card" translate="no"><a href="https://mastodon.sl/@afink" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>afink</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.social/@bagder" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>bagder</span></a></span> <a href="https://mastodon.nu/tags/OpenSSL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSSL</span></a> has some migration guides, are those functions not included in there?<br>Which two?</p>
daniel:// stenberg://<p>I nominate <a href="https://docs.openssl.org/3.3/man3/d2i_X509/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">docs.openssl.org/3.3/man3/d2i_</span><span class="invisible">X509/</span></a> as <a href="https://mastodon.social/tags/OpenSSL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSSL</span></a>'s worst man page. And there's fierce competition for that award.</p><p>And in the end it does not even mention the weird behavior: it stores errors in an internal queue which mysteriously makes the *next* invoked function fail...</p>
Nicola Tuveri<p><a href="https://floss.social/tags/OpenSSL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSSL</span></a> 📢 -- OpenSSL Foundation endorses UN Open Source Principles</p><p>🔗 <a href="https://openssl-foundation.org/post/2025-08-07-un-open-source-principles/?utm_source=atom_feed" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">openssl-foundation.org/post/20</span><span class="invisible">25-08-07-un-open-source-principles/?utm_source=atom_feed</span></a></p><p>From <a href="https://floss.social/tags/OpenSSL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSSL</span></a> -- Blog on OpenSSL Foundation</p>
PhreakByte<p>I can confirm, <a href="https://infosec.exchange/tags/openssl" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openssl</span></a> team doesn't just merge new features 😆</p>
Clemens<p>Improving the world, one PR at a time: <a href="https://github.com/smallstep/crypto/pull/811" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/smallstep/crypto/pu</span><span class="invisible">ll/811</span></a></p><p>The next release of <a href="https://chaos.social/tags/smallstep" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>smallstep</span></a> step-ca will accept the old name "nonRepudiation" in the X.509v3 keyUsage extension as a UX improvement for users coming from, e.g., <a href="https://chaos.social/tags/OpenSSL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSSL</span></a>.</p><p>Inspired by <span class="h-card" translate="no"><a href="https://social.wildeboer.net/@jwildeboer" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>jwildeboer</span></a></span>: <a href="https://social.wildeboer.net/@jwildeboer/114964280013823176" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">social.wildeboer.net/@jwildebo</span><span class="invisible">er/114964280013823176</span></a><br>This stuff is hard enough without such pitfalls, no need to make it more complicated by green bikesheds, er, naming discussions.</p><p><a href="https://chaos.social/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a></p>
Clemens<p>'We are pleased to inform you that we accept your proposal “<a href="https://chaos.social/tags/RedHat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RedHat</span></a>​'s path to post-quantum cryptography with OpenSSL” for the <a href="https://chaos.social/tags/OpenSSL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSSL</span></a> Conference'</p><p>Looks like I'm going to Prague in October!</p>
Mynacol<p>And for some more context: Did you know <a class="hashtag" href="https://social.mynacol.xyz/tag/openssl" rel="nofollow noopener" target="_blank">#openssl</a> 3.x is quite poor in its performance? <a href="https://www.haproxy.com/blog/state-of-ssl-stacks" rel="nofollow noopener" target="_blank">https://www.haproxy.com/blog/state-of-ssl-stacks</a></p>
Mynacol<p>I finally tried to replace <a class="hashtag" href="https://social.mynacol.xyz/tag/openssl" rel="nofollow noopener" target="_blank">#openssl</a> with <a class="hashtag" href="https://social.mynacol.xyz/tag/aws" rel="nofollow noopener" target="_blank">#aws</a>-lc on some of my services. Unfortunately, <a class="hashtag" href="https://social.mynacol.xyz/tag/nginx" rel="nofollow noopener" target="_blank">#nginx</a> and <a class="hashtag" href="https://social.mynacol.xyz/tag/mosquitto" rel="nofollow noopener" target="_blank">#mosquitto</a> lack support for it. Instead, I successfully switched <a class="hashtag" href="https://social.mynacol.xyz/tag/bind" rel="nofollow noopener" target="_blank">#BIND</a> to use aws-lc.</p><p>I later also noticed that the <a class="hashtag" href="https://social.mynacol.xyz/tag/rustls" rel="nofollow noopener" target="_blank">#rustls</a> compatibility shim is in nixpkgs 25.05, but here BIND is missing some variables. And despite the wrapper being explicitly made for nginx, it also fails here with</p><pre><code>/nix/store/mkvc0lnnpmi604rqsjdlv1pmhr638nbd-binutils-2.44/bin/ld: objs/src/stream/ngx_stream_ssl_module.o: in function `ngx_stream_ssl_servername': /build/nginx-1.28.0/src/stream/ngx_stream_ssl_module.c:606:(.text+0xd59): undefined reference to `SSL_SESSION_get0_hostname' </code></pre><p>A shame. I wanted to change to more modern libraries.</p><p>Untested: <a class="hashtag" href="https://social.mynacol.xyz/tag/dovecot" rel="nofollow noopener" target="_blank">#dovecot</a> and <a class="hashtag" href="https://social.mynacol.xyz/tag/postfix" rel="nofollow noopener" target="_blank">#postfix</a> (they lack a <code>services.(dovecot2|postfix).package</code> variable to easily change the used package. A PR for dovecot is already open to add support for it.</p>
testssl.sh :verified:<p>testssl.sh makes it easier now for also for MacOS users to run a <a href="https://infosec.exchange/tags/QUIC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>QUIC</span></a> protocol test -- if you have <a href="https://infosec.exchange/tags/openssl" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openssl</span></a> from e.g. <a href="https://infosec.exchange/tags/homebrew" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>homebrew</span></a> installed.</p><p>It automagically uses that one for testing QUIC then, in 3.3dev.</p>
Daniel<p>Version 5.21 of the open source encryption protocol AmiSSL has been released for AmigaOS 3 and 4, which is now based on the latest version 3.5.1 (2025/07/01) of OpenSSL. </p><p><a href="https://www.amiga-news.de/en/news/AN-2025-07-00003-EN.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">amiga-news.de/en/news/AN-2025-</span><span class="invisible">07-00003-EN.html</span></a></p><p><a href="https://fosstodon.org/tags/Amiga" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Amiga</span></a> <a href="https://fosstodon.org/tags/AmigaOS3" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AmigaOS3</span></a> <a href="https://fosstodon.org/tags/AmigaOS4" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AmigaOS4</span></a> <a href="https://fosstodon.org/tags/AmiSSL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AmiSSL</span></a> <a href="https://fosstodon.org/tags/OpenSSL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSSL</span></a></p>
Richard Levitte<p><span class="h-card" translate="no"><a href="https://mastodon.social/@Viss" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Viss</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.social/@bagder" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>bagder</span></a></span><br>For some, it seems to work. My experience of bug bounties (through <a href="https://mastodon.nu/tags/openssl" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openssl</span></a>) has mostly been slop, even before AI entered the scene. <span class="h-card" translate="no"><a href="https://mastodon.social/@bagder" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>bagder</span></a></span> has had a better experience, it seems.</p>
Christoff, the human<p>Decided to not use <a href="https://oldbytes.space/tags/libev" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>libev</span></a> and use <a href="https://oldbytes.space/tags/libevent" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>libevent</span></a> instead for socket/timer/event loop/callback system. Other than I trust it more, I like the baked in <a href="https://oldbytes.space/tags/openssl" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openssl</span></a> support (will use for <a href="https://oldbytes.space/tags/telnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>telnet</span></a>+tls later).</p><p>Additionally, going to try out sqlcipher (<a href="https://oldbytes.space/tags/sqlite3" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sqlite3</span></a> + AES encryption baked in) for data storage. Everything will be stored in a sqlite3 database.</p><p>Using cmake and pkg-config, <a href="https://oldbytes.space/tags/C" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>C</span></a>, sqlite3 (sqlcipher), libevent, and openssl. </p><p>Decided to just focus on developing the software on KDE neon distro (Ubuntu LTS) and worry about other OSes later. I spent too much time worrying about ease of build/install instructions for other operating systems instead of just deciding and moving forward.</p><p><a href="https://oldbytes.space/tags/BBS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BBS</span></a> <a href="https://oldbytes.space/tags/NecroNeonBBS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NecroNeonBBS</span></a> <a href="https://oldbytes.space/tags/Vaporware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vaporware</span></a></p>
Felix Palmen :freebsd: :c64:<p>Just released: <a href="https://mastodon.bsd.cafe/tags/swad" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>swad</span></a> 0.12 🥂</p><p>swad is the "Simple Web Authentication Daemon". It basically offers adding form + <a href="https://mastodon.bsd.cafe/tags/cookie" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cookie</span></a> <a href="https://mastodon.bsd.cafe/tags/authentication" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>authentication</span></a> to your reverse proxy (designed for and tested with <a href="https://mastodon.bsd.cafe/tags/nginx" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nginx</span></a> "auth_request"). I created it mainly to defend against <a href="https://mastodon.bsd.cafe/tags/malicious_bots" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malicious_bots</span></a>, so among other credential checker modules for "real" logins, it offers a proof-of-work mechanism for guest logins doing the same <a href="https://mastodon.bsd.cafe/tags/crypto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>crypto</span></a> <a href="https://mastodon.bsd.cafe/tags/challenge" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>challenge</span></a> known from <a href="https://mastodon.bsd.cafe/tags/Anubis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Anubis</span></a>.</p><p>swad is written in pure <a href="https://mastodon.bsd.cafe/tags/C" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>C</span></a> with minimal dependencies (<a href="https://mastodon.bsd.cafe/tags/zlib" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zlib</span></a>, <a href="https://mastodon.bsd.cafe/tags/OpenSSL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSSL</span></a> or compatible, and optionally <a href="https://mastodon.bsd.cafe/tags/PAM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PAM</span></a>), and designed to work on any <a href="https://mastodon.bsd.cafe/tags/POSIX" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>POSIX</span></a> system. It compiles to a small binary (200 - 300 kiB depending on compiler and target platform).</p><p>This release brings (among a few bugfixes) improvements to make swad fit for "heavy load" scenarios: There's a new option to balance the load across multiple service worker threads, so all cores can be fully utilized if necessary, and it now keeps lots of transient objects in pools for reuse, which helps to avoid memory fragmentation and ultimately results in lower overall memory consumption.</p><p>Read more about it, download the .tar.xz, build and install it .... here:</p><p><a href="https://github.com/Zirias/swad" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/Zirias/swad</span><span class="invisible"></span></a></p>