by ayrx on 11/3/16, 1:23 PM with 195 comments
by mythz on 11/3/16, 2:12 PM
> No dynamic allocation whatsoever. There is not a single malloc() call in all the library. In fact, the whole of BearSSL requires only memcpy(), memmove(), memcmp() and strlen() from the underlying C library. This makes it utterly portable even in the most special, OS-less situations. (On “big” systems, BearSSL will automatically use a couple more system calls to access the OS-provided clock and random number generator.)
> On big desktop and server OS, this feature still offers an interesting characteristic: immunity to memory leaks and memory-based DoS attacks. Outsiders cannot make BearSSL allocate megabytes of RAM since BearSSL does not actually know how to allocate RAM at all.
Edit: Just discovered what makes this an even more interesting one to watch, it's the work of this Wizard: http://security.stackexchange.com/users/655/thomas-pornin
by bluejekyll on 11/3/16, 2:48 PM
I'm personally really excited for this: https://github.com/briansmith/ring
It's a Rust oxidization of the BoringSSL library, meaning that parts of BoringSSL are being rewritten in Rust, with the eventual goal of being pure Rust.
by tptacek on 11/3/16, 3:57 PM
But: Thomas Pornin!
So, this is pretty neat. I hope lots of crypto people take a very hard look at it.
by rdeboo on 11/3/16, 1:53 PM
by savara on 11/3/16, 2:46 PM
followed by:
"TLS 1.0, TLS 1.1 and TLS 1.2 are supported", "3DES/CBC encryption algorithms are supported", and "SHA-1 [is supported]"
Sad-face.
by stompin on 11/3/16, 2:46 PM
Makes me suspect that a major goal is anonymity. It's less aimed at users installing on their non-anonymous Windows/Mac/phone but rather leverage generic/commodity hardware to communicate over SSL. Throwaway burner phones.
by diafygi on 11/3/16, 4:36 PM
by federicoponzi on 11/3/16, 3:08 PM
by ncw33 on 11/3/16, 3:37 PM
I think it's great when people write something for the love of it.
For a high quality TLS implementation that is production-ready, and has had extensive third-party verification and certification, I'd recommend mbedTLS from ARM.
by israrkhan on 11/3/16, 6:18 PM
by conductor on 11/3/16, 9:40 PM
Thanks, we definitely need a secure and reputable TLS implementation with small footprint for IoT devices.
[invalid issue removed]
by client4 on 11/3/16, 4:41 PM
by falcolas on 11/3/16, 2:29 PM
by crb002 on 11/3/16, 2:06 PM
by unwind on 11/3/16, 2:25 PM
However, it seems it's been developed "in secret" and the only public commit is a huge import of all of it. :/
Too bad, the development history would have been very interesting to read, digesting it all at once is harder.
by bluefox on 11/3/16, 7:26 PM
by shove on 11/3/16, 4:06 PM
by lisper on 11/3/16, 3:26 PM
by amluto on 11/3/16, 8:41 PM
by eganist on 11/3/16, 2:11 PM
Disregard me.
by mtgx on 11/3/16, 3:10 PM
And 3DES?
by nwmcsween on 11/3/16, 2:27 PM