#OpenSSL π’ -- The OpenSSL Corporation Becomes Official General Partner of ZOO Brnoβs Beringia Enclosure
π https://openssl-corporation.org/post/2025-07-10-zoo-brno-gen-partner/?utm_source=atom_feed
From #OpenSSL -- Blog on OpenSSL Corporation
#OpenSSL π’ -- The OpenSSL Corporation Becomes Official General Partner of ZOO Brnoβs Beringia Enclosure
π https://openssl-corporation.org/post/2025-07-10-zoo-brno-gen-partner/?utm_source=atom_feed
From #OpenSSL -- Blog on OpenSSL Corporation
#OpenSSL π’ -- Contributors to the OpenSSL Library (June 2025)
π https://openssl-library.org/post/2025-07-10-june-contributors/?utm_source=atom_feed
From #OpenSSL -- Blog on OpenSSL Library
#OpenSSL π’ -- The Features of 3.5: EVP_SKEY
π https://openssl-foundation.org/post/2025-07-08-3.5-evp_skey/?utm_source=atom_feed
From #OpenSSL -- Blog on OpenSSL Foundation
#OpenSSL π’ -- The State of the OpenSSL Community (3.5)
π https://openssl-foundation.org/post/2025-07-07-state-of-community-3.5/?utm_source=atom_feed
From #OpenSSL -- Blog on OpenSSL Foundation
@nilz hatte schon befΓΌrchtet, dass der Podcast diese Vorurteile aufgreift. Diese Einzelentwickler*innen gibt es auch, aber ist nicht die Masse.OSS ist Big Business, problematisch sind manchmal kleine Projekte, die tatsΓ€chlich wichtig sind, aber zu wenig betreut, siehe auch #OpenSSL .Diese kleinen Projekte, die nicht essentiell sind, sind nicht so bedeutend oder problematisch, wenn was schief geht. Fehler gibt es ja auch bei closed source, das ist kein Alleinstellungsmerkmal.
I've been playing around with certificates lately and wrote a small bit to remember some #OpenSSL commands https://humberto.io/bits/extract-certificate-from-a-domain/
#OpenSSL π’ -- There's still time to share your story
π https://openssl-library.org/post/2025-07-03-wild-ending/?utm_source=atom_feed
From #OpenSSL -- Blog on OpenSSL Library
#OpenSSL π’ -- There's still time to share your story
π https://openssl-foundation.org/post/2025-07-03-wild-ending/?utm_source=atom_feed
From #OpenSSL -- Blog on OpenSSL Foundation
#OpenSSL 3.5.1 (#LTS) has been released (#SSL / #TLS) https://openssl-library.org/
#OpenSSL π’ -- Openssl Release Announcement for 3.5.1, 3.4.2, 3.3.4, 3.2.5, and 3.0.17
π https://openssl-library.org/post/2025-07-01-release-announcement/?utm_source=atom_feed
From #OpenSSL -- Blog on OpenSSL Library
KEKS ΠΊΠΎΠ΄Π΅ΠΊ ΠΈ ΠΊΡΠΈΠΏΡΠΎΠ³ΡΠ°ΡΠΈΡΠ΅ΡΠΊΠΈΠ΅ ΡΠΎΠΎΠ±ΡΠ΅Π½ΠΈΡ
ΠΠ°Π½Π½Π°Ρ ΡΡΠ°ΡΡΡ Π½Π°ΠΏΠΎΠΌΠΈΠ½Π°Π΅Ρ ΠΎ ΠΏΡΠΎΠ±Π»Π΅ΠΌΠ°Ρ X.509 PKI ΠΈ ΡΠ΅Π°Π»ΠΈΠ·Π°ΡΠΈΠΉ ASN.1. ΠΡΠ΅Π΄Π»Π°Π³Π°Π΅Ρ ΠΊΠΎΠΌΠΏΠ°ΠΊΡΠ½ΡΠΉ, Π±ΡΡΡΡΡΠΉ, Π΄Π΅ΡΠ΅ΡΠΌΠΈΠ½ΠΈΡΠΎΠ²Π°Π½Π½ΡΠΉ, ΠΏΠΎΡΠΎΠΊΠΎΠ²ΡΠΉ ΠΈ ΠΏΡΠΎΡΡΠΎΠΉ ΡΠΎΡΠΌΠ°Ρ ΠΊΠΎΠ΄ΠΈΡΠΎΠ²Π°Π½ΠΈΡ Π΄Π°Π½Π½ΡΡ KEKS, Π° ΡΠ°ΠΊΠΆΠ΅ ΠΊΡΠΈΠΏΡΠΎΠ³ΡΠ°ΡΠΈΡΠ΅ΡΠΊΠΈΠ΅ ΡΠΎΠΎΠ±ΡΠ΅Π½ΠΈΡ Π΄Π»Ρ ΠΏΠΎΠ΄ΠΏΠΈΡΠΈ ΠΈ ΡΠΈΡΡΠΎΠ²Π°Π½ΠΈΡ Π΄Π°Π½Π½ΡΡ Ρ ΠΏΠΎΠ΄Π΄Π΅ΡΠΆΠΊΠΎΠΉ ΠΏΠΎΡΡ-ΠΊΠ²Π°Π½ΡΠΎΠ²ΡΡ Π°Π»Π³ΠΎΡΠΈΡΠΌΠΎΠ².
https://habr.com/ru/articles/923810/
#c #go #python #keks #asn1 #x509 #openssl #ΠΊΡΠΈΠΏΡΠΎΠ³ΡΠ°ΡΠΈΡ #pqc #hpke #pgp #cms
Decided to not use #libev and use #libevent instead for socket/timer/event loop/callback system. Other than I trust it more, I like the baked in #openssl support (will use for #telnet+tls later).
Additionally, going to try out sqlcipher (#sqlite3 + AES encryption baked in) for data storage. Everything will be stored in a sqlite3 database.
Using cmake and pkg-config, #C, sqlite3 (sqlcipher), libevent, and openssl.
Decided to just focus on developing the software on KDE neon distro (Ubuntu LTS) and worry about other OSes later. I spent too much time worrying about ease of build/install instructions for other operating systems instead of just deciding and moving forward.
Just released: #swad 0.12 π₯
swad is the "Simple Web Authentication Daemon". It basically offers adding form + #cookie #authentication to your reverse proxy (designed for and tested with #nginx "auth_request"). I created it mainly to defend against #malicious_bots, so among other credential checker modules for "real" logins, it offers a proof-of-work mechanism for guest logins doing the same #crypto #challenge known from #Anubis.
swad is written in pure #C with minimal dependencies (#zlib, #OpenSSL or compatible, and optionally #PAM), and designed to work on any #POSIX system. It compiles to a small binary (200 - 300 kiB depending on compiler and target platform).
This release brings (among a few bugfixes) improvements to make swad fit for "heavy load" scenarios: There's a new option to balance the load across multiple service worker threads, so all cores can be fully utilized if necessary, and it now keeps lots of transient objects in pools for reuse, which helps to avoid memory fragmentation and ultimately results in lower overall memory consumption.
Read more about it, download the .tar.xz, build and install it .... here:
#OpenSSL π’ -- OpenSSL Corporation at NYC Tech Week 2025: Advancing Security, Trust, and Open Innovation
π https://openssl-corporation.org/post/2025-06-23-techdays-nyc/?utm_source=atom_feed
From #OpenSSL -- Blog on OpenSSL Corporation
I added OpenSSL encryption into script for NS exchange between servers with Pihole 6.
Oh boy, I have a lead! And it's NOT related to #TLS. I finally noticed another pattern: #swad only #crashed when running as a #daemon. The daemonizing wasn't the problem, but the default logging configuration attached to it: "fake async", by letting a #threadpool job do the logging.
Forcing THAT even when running in foreground, I can finally reproduce a crash. And I wouldn't be surprised if that was actually the reason for crashing "pretty quickly" with #LibreSSL (and only rarely with #OpenSSL), I mean, something going rogue in your address space can have the weirdest effects.