| ▲ | tptacek 4 hours ago | |||||||
The security side of OpenSSL improved significantly since Heartbleed, which was a galvanizing moment for the maintenance practices of the project. It doesn't hurt that OpenSSL is now one of the most actively researched software security targets on the Internet. The software quality side of OpenSSL paradoxically probably regressed since Heartbleed: there's a rough consensus that the design of OpenSSL 3.0 was a major step backwards, not least for performance, and more than one large project (but most notably pyca/cryptography) is actively considering moving away from OpenSSL entirely as a result. Again: while security concerns might be an ancillary issue in those potential migrations, the core issue is just that OpenSSL sucks to work with now. | ||||||||
| ▲ | ImJasonH 2 hours ago | parent | next [-] | |||||||
On this topic, there was a great episode of a little-known podcast about Python cryptography and OpenSSL that was really eye opening: https://securitycryptographywhatever.buzzsprout.com/1822302/... :) | ||||||||
| ||||||||
| ▲ | ignoramous an hour ago | parent | prev [-] | |||||||
> ... the core issue is just that OpenSSL sucks to work with now. NodeJS working group don't seem happy working with OpenSSL, either. There's been indication Node may move off of it (though, I remain sceptical):
Update on QUIC, https://github.com/nodejs/node/issues/57281 (2025). | ||||||||