On Mon, 2020-12-28 at 23:18 +0000, Peter Stuge wrote:
> Michał Górny wrote:
> > > A. It is a distinct implementation with probably /quite some/
> > > stable
> > > compatibility, meaning that it will work perfectly fine as an
> > > alternative in many cases.
> > 
> > Except that it doesn't, as has been proven numerous times.
> 
> I'm sure that there are numerous cases where libressl doesn't work,
> but that's no reason to dismiss cases where it *does*.

Are you asking people to put an effort into maintaining something that
can't be practically installed?  'I don't use a single Qt application
(yet!), so I demand you support LibreSSL for me!'

A side effect of this approach is that users will be tricked into using
LibreSSL, only to discover that they eventually have to transition
their systems back.  We have been there with LibAV.  However, unlike
LibAV, transition between SSL providers is non-trivial.

> Did anyone gather actual numbers?

$ find -name '*libressl*.patch' | grep -v dev-libs/libressl | wc -l
61

That's just the tip of the iceberg.  Nobody's going to be able to even
guess how many upstream have accepted *bad* patches.  How many packages
are forcing obsolete algorithms because someone added '!libressl'
conditions because LibreSSL keeps pretending to be a newer OpenSSL
version without actually implementing its API.

> > > B. It brings its own TLS API, a unique feature which by itself
> > > warrants the package.
> > 
> > ...which by itself has no future
> 
> That's arrogant and silly coming from anywhere but upstream.
> 
> You can argue that you will never use the API in your TLS programs,
> but even then that says really nothing about the API provider itself.

That's my opinion and I have a right to have it without being insulted.

I don't dispute whether it's good.  I dispute whether tightly binding
it to a problematic LibreSSL is a good idea.  Sure, this means that
some people will be forced to use LibreSSL because of libtls.

But in practice, this means that any upstream starting to use libtls
does a huge disservice to their users by preventing them from using
their preferred SSL provider.  So in the end, you either don't use
libtls or your users are in pain.

Actually, I see that someone has apparently forked libtls into libretls
(the irony!) that works against OpenSSL [1].

[1] https://git.causal.agency/libretls/about/


-- 
Best regards,
Michał Górny



Reply via email to