-
Notifications
You must be signed in to change notification settings - Fork 29.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Plans on incorporating BoringSSL #1860
Comments
Not a stupid question but I speculate it's not something we'll undertake lightly. A lot of time and effort has been sunk in integrating OpenSSL. For starters, someone (not me, I'm not volunteering) would have to GYP-ify BoringSSL so it can be integrated with the build system. |
I never did this but I can try.
|
That would a good first step. You may want to take a look at openssl.gyp and openssl.gypi for the feature sets that would need to be supported. For example, we try very hard to use the assembly versions of algorithms when available, the cli tools are built for use in the test suite, there are some Windows fix-ups, etc. It's also an open question how distro packagers that link to a shared openssl should deal with this. Also, /cc @nodejs/crypto - it would be good to get consensus first before you waste a lot of time on something that ends up getting rejected. EDIT: For the record, I'm neutral on this. I don't see compelling reasons pro or con boringssl vis-a-vis openssl. For any pro, you can probably come up with a con and vice versa. |
Did further research:
|
I think OpenSSL is quite close to integrating ChaCha. Since we are on 1.0.2
Don't get me wrong, Adam is a security expert, but I don't have much trust Second thing - I am a bit afraid of how the CVEs will be made available for On Monday, June 1, 2015, Tycho Tatitscheff notifications@github.com wrote:
|
Sure I will wait from this but due to the fact that gyp version already exists, it would be not that hard to extarct crypto from chromium project (both |
@indutny seem's valide concern. So:
Anyway, if you guys choose to give it a try I can start looking into this (forking, configuring gyp and starting the replacement). |
Diffing first boringssl commit and last openssl commit before fork, even with suppressing boringssl go test file, open and boring ssl build file, docs and co and requesting minimal, there is still plenty changes. https://gist.github.com/tychotatitscheff/52bbd3e003e9c9d97e0a |
I thought of this some times ago and have a few comments.
But anyway, I think it is very interesting to support BoringSSL in iojs. TLS1.3 is forth-coming and BoringSSL would be one of the early adopter to support it. It would be great if we can have alternate solutions for SSL library. |
Oh, another cons from me (inspired by @shigeki's comment): There are many user space addons that depend on OpenSSL API. If not a On Monday, June 1, 2015, Shigeki Ohtsu notifications@github.com wrote:
|
would'nt it be great to say request({ Where boring ssl subscribes to some fundamental wrapper definition of the minimum subset of functionality that needs to be exposed. *edit |
I will ping @agl about this.
After |
Hi guys, no news here since some time. I'm using nodejs on Scaleway C1 arm machines... and making https requests to some external APIs is very slow... I pay a minimum overhead of 200ms for each request... freaking no? So... yes patched OpenSSL or using LibreSSL should be cool for example. I can help as benefits would be great for me. |
I'm going to close this for now because BoringSSL clearly says that incorporating to the third parties is not recommended in README. See https://boringssl.googlesource.com/boringssl/ as
|
we are building using node in a project that also uses Chrome so using boringssl looks like it will save a lot of build headaches. The changes are trivial. On the first pass I commented out |
It was already included in https://boringssl.googlesource.com/boringssl/+/373a6a5a7d0b055f1bb4cfe7bb4254c49a28ab67 . In the long run to incorporate BoringSSL, I'd like to have a comment from @agl . |
that commit would seem to indicate a desire to keep it compatible despite the reference you linked to above |
We try to keep the number of patches needed to build Node with BoringSSL to a minimum, and for those patches to be included in node/master where applicable. That's because we have some internal case where we build Node with BoringSSL. So, while running Node with BoringSSL is likely to be relatively painless because of the above, it might need some tweaking from time-to-time. We don't currently have any plans to publish our patches to Node, although that's not inconceivable if useful. |
@agl Thanks for your comments. I'm very glad to have contributions to build Node with BoringSSL but I think that it's not yet officially supported use according to Google's plan. I'm going to close this again. |
@agl we are interested in the patches and plan on moving forward with building against boringssl |
If somebody has node building with boringssl, we would be very much interested as well so that node and webrtc work together nicely. |
It won't be near future and I think that you have better things to do (in peculiar with 3.x release and v8 mess) but if #428 is delayed could BoringSSl be an option ?
In fact it :
Don't mind to close this if you find that this is a dumb question.
EDIT : md formatting and more informations.
The text was updated successfully, but these errors were encountered: