On Wed, Jul 03, 2024 at 11:18:12PM +0200, Илья Шипицин wrote:
> Subject: Re: [ANNOUNCE] haproxy-3.1-dev2
> сб, 29 июн. 2024 г. в 12:01, Willy Tarreau <w...@1wt.eu>:
> 
> > Hi,
> >
> > HAProxy 3.1-dev2 was released on 2024/06/29. It added 45 new commits
> > after version 3.1-dev1.
> >
> > Several fixes related to the recent 3.0 release are present in this
> > version, as well as a few older ones. Most visible are three QUIC
> > crashes, a possible double free on stick-tables, issues affecting
> > aws-lc with ECDSA, a risk of server flapping when DNS resolution
> > times out, and the usual amount of small fixes all over the place.
> >
> > In addition we've been notified by Yuki Mogi of FFRI Security that
> > some of our pseudo-headers in H3 were not sanitized enough and that
> > these could theoretically be abused with some severely non-compliant
> > backend servers, so this was fixed as well. This will be backported
> > to the next stable versions as it's not dramatic enough to warrant a
> > release on its own.
> >
> > The "show dev" command was improved to report command-line args as
> > well as boot & current capabilities. Linux capabilities switched to
> > v3 instead of v1 in order to avoid a deprecation warning on recent
> > kernels. We've checked the impacts and apparently there are none,
> > beyond the lack of support of kernels prior to 2.6.26, so we'll soon
> > backport it to 3.0 so as to silence the annoying warning users are
> > facing.
> >
> > A date converter was added to take an HTTP date on input and produce
> > a UNIX timestamp on output. This will help calculate expiration delays
> > for example.
> >
> > The sigalg feature was added for aws-lc, which, I think, should now
> > match 1:1 the features level of openssl (unless I'm missing something).
> >
> 
> it is VERY close to openssl. however there are few gaps.
> the one I'm aware of is
> 
> haproxy/include/haproxy/quic_tls.h at master · haproxy/haproxy (github.com)
> <https://github.com/haproxy/haproxy/blob/master/include/haproxy/quic_tls.h#L143-L154>
> 
> aws-lc implements chacha20_poly1305 in a different way than QuicTLS.
> and if that gap is eliminated, it will be a good point to declare aws-lc as
> a recommended QUIC lib.
> 
> if we compare aws-lc against openssl-1.1 (not quictls), it is indeed
> matches (maybe except some niche features like async)
> 

BoringSSL, LibreSSL, and AWS-LC uses the EVP_AEAD API, basically we would need
to use EVP_aead_chacha20_poly1305() instead of EVP_chacha20_poly1305(), and
EVP_aead_chacha20_poly1305() instead of EVP_chacha20() and uses the EVP_AEAD
functions. IMHO this is not a huge change and this is doable, we just need to
invest some time on it.

Regards,

-- 
William Lallemand

Reply via email to