孕囊长什么样| 间接胆红素是什么意思| mv是什么意思| 口淡无味是什么原因| 一直发低烧是什么原因| 什么叫有个性的人| 婴儿拉肚子是什么原因造成的| 送男生什么生日礼物好| 什么的嗓音| 息肉和痔疮有什么区别| 弄得什么| 子代表什么意思| 18点是什么时辰| co2cp在医学上是什么| 湿肺是什么意思| 早上吃什么水果最好| 滑膜炎用什么药治疗最好最快| 学考成绩什么时候公布| 精满自溢是什么意思| 梦魇是什么| 冰爽丝是什么面料| 八面玲珑是什么意思| 魔芋粉是什么做的| 一见如什么| 什么的笑着| 宫禁糜烂用什么药| 羊宝是什么| 经常呕吐是什么原因| 营养性贫血是什么意思| 应无所住什么意思| 氟斑牙是什么原因造成的| 益生菌什么牌子好| 小棉袄是什么意思| 清水文是什么意思| 胃出血吃什么食物好养胃| 嘴贱什么意思| 上吐下泻吃什么好| 氯雷他定片主治什么| 糖尿病人早餐吃什么好| 桂林山水甲天下是什么意思| 腰间盘挂什么科| 神经内科和神经外科有什么区别| 口红什么牌子最好| 种马文是什么意思| 今天突然拉稀拉出血什么原因| 乳酸杆菌阳性什么意思| 狗尾续貂是什么意思| 低回声是什么意思| 甘草片不能和什么药一起吃| 海蛎子是什么| 黄药是什么| clean什么意思| 和衣是什么意思| 花重锦官城的重是什么意思| 荷花代表什么| 白雪什么| 上海有什么好玩的地方旅游景点| 6月18号什么星座| 做梦梦见好多蛇是什么预兆| 长期喝酒对身体有什么危害| 高血压吃什么好降压快| 吃什么可以养肝| 脑白质缺血性改变什么意思| 葡萄套袋前打什么药| 濯清涟而不妖的濯是什么意思| 2019年出生属什么生肖| 空气刘海适合什么脸型| 青羊药片有什么功效| 喝酒断片是什么原因| 吃维生素b2有什么好处和副作用| lgg什么意思| 柳丁是什么| 泌乳素是什么| 飞蚊症用什么药物治疗最好| 六月十六是什么日子| 吃什么都咸是什么原因| 一落千丈是什么生肖| 卡西欧手表属于什么档次| 舌头变黑是什么原因| 胃胀不消化吃什么药| 神经衰弱吃什么中成药| 什么都想要| 前列腺液是什么东西| 斐乐手表属于什么档次| 鹰嘴桃什么时候成熟| 嗓子疼吃什么水果好| 思量是什么意思| 牛大力泡酒有什么功效| 嘴角发麻是什么病前兆| 属虎是什么命| 冷冻液是什么| 恢复伤口吃什么好得快| 东字五行属什么| 筵是什么意思| 胎神什么意思| 颈动脉斑块是什么意思| 吃什么能让月经快点来| 生殖器疱疹用什么药| 女人吃什么养肝排毒| 合胞病毒是什么| 什么叫骨折| 我是舅舅的什么人| 什么可以保护眼睛| 搭档是什么意思| 1987年属什么今年多大| 春梦是什么| 肾虚什么症状| 白细胞少了会得什么病| 消化不好吃什么药最好| 头发大把大把的掉是什么原因| 脸发黄是什么原因| 冲床工是做什么的| 喝铁观音茶有什么好处| lucas是什么意思| 什么是童子命| est是什么意思| 左氧氟沙星是什么药| c反应蛋白高吃什么药| 什么是修养| 9月3号什么日子| 开拔是什么意思| 柏读什么| 河南有什么特色美食| 木芙蓉什么时候开花| 文爱是什么意思| 空气棉是什么面料| 牙套什么材质的好| 内科检查什么| 形态什么| 尿道炎什么症状| 羊肉馅饺子配什么菜好| 膝超伸是什么| 什么的教学楼| 痛风是什么原因| 阴灵是什么意思| 咳嗽有白痰一直不好是什么原因| 口嫌体正直什么意思| 低回声是什么意思| 君子兰什么季节开花| 阿尔兹海默症吃什么药| 大熊猫的尾巴是什么颜色| 农村做什么生意赚钱| whoo是什么牌子| 肉包子打狗的歇后语是什么| 经常胸闷是什么原因| 返现是什么意思| 输血浆主要起什么作用| 好奇害死猫什么意思| 女人裹脚是从什么时候开始的| 胆囊炎的症状是什么| 人大常委会副主任是什么级别| 慢性病卡有什么用| 晚上睡觉口干舌燥是什么原因| 始终如一是什么意思| impress是什么意思| 虫可念什么| 强回声斑块是什么意思| 7.21是什么日子| 低血糖有什么症状| 什么补血效果最好最快| 荆棘是什么植物| 五月三十一号是什么星座| 眩晕是什么症状| 床上用品四件套都有什么| 石见念什么| 存在感是什么意思| 30年婚姻叫什么婚| 踢馆什么意思| 西瓜和什么食物相克| 增生性贫血是什么意思| 痔疮有什么症状| 10.17是什么星座| 怀孕挂什么科| 什么是菩提心| 喉咙有痰吐出来有血是什么原因| 小肚子是什么部位| 经常出汗是什么原因| ecom什么意思| 9月25日什么星座| 什么是凯格尔运动| 为什么会面瘫| 什么叫做凤凰男| 魔术贴是什么| a和ab型生的孩子是什么血型| 什么降血压效果最好| 梦见纸人是什么意思| 全身无力吃什么药| 贤上腺瘤是什么意思| 猩红热是什么病| 六亲不认是什么生肖| 什么贵人能治孤辰寡宿| 挛是什么意思| 温碧泉属于什么档次| 玉越戴越亮是什么原因| 甲亢有什么症状表现| cip是什么意思| 高血压是什么意思| 高血压药什么时候吃最好| 梦到妈妈怀孕什么预兆| 嫦娥奔月是什么节日| 6月26号是什么日子| 三百多分能上什么大学| 果子狸携带什么病毒| 尿气味很重是什么原因| 和珅属什么生肖| 小燕子的尾巴像什么| 怀孕初期吃什么补充营养| 乐可是什么| 家里飞蛾多是什么原因| 什么生肖站着睡觉| 5是什么生肖| 什么花一年四季都开| 肌瘤是什么| 无所适从什么意思| 即兴是什么意思| ufc什么意思| 什么是斜率| 老年人屁多是什么原因| 脾肾气虚的症状是什么| 吃什么补肝| 抹布是什么意思| 7月6日是什么日子| 一什么图画| 湿疹是什么样子| 老娘们是什么意思| 喜是什么意思| 高岭土是什么| 感冒了吃什么水果比较好| 为什么眼睛老是痒| 充饥是什么意思| 阳虚吃什么中药调理| 人为什么有两个鼻孔| 本垒打是什么意思| 今年40岁属什么生肖| 男性夜间盗汗什么原因| 能人是什么意思| 肚子拉稀是什么原因| 为什么血液是红色的| 柠檬有什么作用| 游戏bp是什么意思| 低压低是什么原因| 皮毒清软膏有什么功效| 痦子是什么| 怀孕呕吐吃什么可以缓解| 弥可保是什么药| hpv是什么病| 梦见包饺子是什么征兆| 一班三检是指什么| 双性是什么意思| 深圳市长什么级别| 头昏吃什么药| 不打自招是什么生肖| 泌尿系统感染有什么症状| 正常的包皮什么样子| 淋巴结肿大看什么科| 喝酒前吃什么不容易醉又不伤胃| 血稠吃什么药| 碳酸钙是什么东西| 碳酸钙d3颗粒什么时候吃最好| 血小板压积偏高是什么意思| 心率失常是什么意思| 鸽子单眼伤风用什么药| 辣椒有什么营养价值| 1.18是什么星座| 百度Jump to content

新华网两会创意视频:故事化讲述 可视化呈现 全媒化传播

From Wikipedia, the free encyclopedia
百度   “你有多久没牵妈妈的手了”这场由中央网信办指导,各中央重点新闻网站参与的互动活动,通过微博,在网友中征集与妈妈的合影或视频,讲述家风家教家训的故事。

OpenSSL
Developer(s)The OpenSSL Project
Initial release1998; 27 years ago (1998)
Stable release
Stable3.5.1[1] Edit this on Wikidata / 1 July 2025
Repository
Written inC, Assembly, Perl
TypeCryptography library
License3.0 and later: Apache-2.0[2]
1.x and earlier: OpenSSL[3]
Websitewww.openssl.org

OpenSSL is a software library for applications that provide secure communications over computer networks against eavesdropping, and identify the party at the other end. It is widely used by Internet servers, including the majority of HTTPS websites.

OpenSSL contains an open-source implementation of the SSL and TLS protocols. The core library, written in the C programming language, implements basic cryptographic functions and provides various utility functions. Wrappers allowing the use of the OpenSSL library in a variety of computer languages are available.

The OpenSSL Software Foundation (OSF) represents the OpenSSL project in most legal capacities including contributor license agreements, managing donations, and so on. OpenSSL Software Services (OSS) also represents the OpenSSL project for support contracts.

OpenSSL is available for most Unix-like operating systems (including Linux, macOS, and BSD), Microsoft Windows and OpenVMS.

Project history

[edit]

The OpenSSL project was founded in 1998 to provide a free set of encryption tools for the code used on the Internet. It is based on a fork of SSLeay by Eric Andrew Young and Tim Hudson, which unofficially ended development on December 17, 1998, when Young and Hudson both went to work for RSA Security. The initial founding members were Mark Cox, Ralf Engelschall, Stephen Henson, Ben Laurie, and Paul Sutton.[4]

In 2018 OpenSSL version numbering skipped from 1.1.1 to 3.0.0, omitting 2 as a major version number to avoid a conflict with one of OpenSSL's modules. Version 3.0.0 was the first to use the Apache License.

As of May 2019,[5] the OpenSSL management committee consisted of seven people[6] and there are seventeen developers[7] with commit access (many of whom are also part of the OpenSSL management committee). There were only two full-time employees (fellows) and the remainder were volunteers.

By 2024, there were fourteen employees.

The project had a total income of US$5.5 million in 2024.[8] Development of TLS 1.3 was sponsored by Akamai.[9]

Major version releases

[edit]
OpenSSL release history[10][11]
Version Original release date Support until[12] Comment Last minor version
Unsupported: 0.9.1[13] 23 December 1998 (2025-08-05)
  • Official start of the OpenSSL project
0.9.1c (23 December 1998)
Unsupported: 0.9.2[13] 22 March 1999 (2025-08-05)
  • Successor of 0.9.1c
0.9.2b (6 April 1999)
Unsupported: 0.9.3[13] 25 May 1999 (2025-08-05)
  • Successor of 0.9.2b
0.9.3a (27 May 1999)
Unsupported: 0.9.4[13] 9 August 1999 (2025-08-05)
  • Successor of 0.9.3a
0.9.4 (9 August 1999)
Unsupported: 0.9.5[13] 28 February 2000 (2025-08-05)
  • Successor of 0.9.4
0.9.5a (1 April 2000)
Unsupported: 0.9.6[13] 24 September 2000 (2025-08-05)
  • Successor of 0.9.5a
0.9.6m (17 March 2004)
Unsupported: 0.9.7[13] 31 December 2002 (2025-08-05)
  • Successor of 0.9.6m
0.9.7m (23 February 2007)
Unsupported: 0.9.8[13] 5 July 2005 (2025-08-05)
  • Successor of 0.9.7m
0.9.8zh (3 December 2015)
Unsupported: 1.0.0[14] 29 March 2010 (2025-08-05)
  • Successor of 0.9.8n
1.0.0t (3 December 2015 (2025-08-05))
Unsupported: 1.0.1[15] 14 March 2012 (2025-08-05) 31 December 2016 (2025-08-05)
  • Successor of 1.0.0h
  • Support for TLS/DTLS heartbeat[16]
  • Support for SCTP
  • Support for TLS keying material exporter[17]
  • Support for DTLS key establishment for SRTP[18]
  • Next Protocol Negotiation
  • PSS signatures in certificates, requests and certificate revocation lists (CRL)
  • Support for password based recipient info for CMS
  • Support for TLS 1.2 and TLS 1.1
  • Preliminary FIPS 140 capability for unvalidated 2.0 FIPS module
  • Secure Remote Password protocol (SRP) support
1.0.1u (22 September 2016 (2025-08-05))
Unsupported: 1.0.2[19] 22 January 2015 (2025-08-05) 31 December 2019 (2025-08-05) 1.0.2u (20 December 2019 (2025-08-05))
Unsupported: 1.1.0[20] 25 August 2016 (2025-08-05) 11 September 2019 (2025-08-05)
  • Successor of 1.0.2h
  • Support for BLAKE2[21]
  • Support for ChaCha20-Poly1305[22]
  • Support for X25519[23]
  • Support for DANE and Certificate Transparency
  • Support for CCM Ciphersuites
  • Support for extended master secret
  • SSLv2 removed
  • Kerberos ciphersuite support removed
  • RC4 and 3DES removed from DEFAULT ciphersuites in libssl
  • Remove DSS, SEED, IDEA, CAMELLIA, and AES-CCM from the DEFAULT cipherlist
  • 40 and 56 bit cipher support removed from libssl
  • FIPS 140 support removed
1.1.0l (10 September 2019 (2025-08-05))
Unsupported: 1.1.1 LTS[24][25] 11 September 2018 (2025-08-05) 11 September 2023 (2025-08-05) (LTS) 1.1.1w (11 September 2023)
Supported: 3.0 LTS[28][29]
[note 1]
7 September 2021 (2025-08-05) 7 September 2026 (2025-08-05) (LTS) Ongoing development
Unsupported: 3.1[31][32] 14 March 2023 (2025-08-05) 14 March 2025 (2025-08-05) 3.1.8 (11 February 2025)
Supported: 3.2[33][34] 23 November 2023 (2025-08-05) 23 November 2025 (2025-08-05)
  • Client-side QUIC support
  • TLS Certificate compression[35]
  • Deterministic use of ECDSA[36]
  • TLS raw public keys[37]
Ongoing development
Supported: 3.3[38] 9 April 2024 (2025-08-05) 9 April 2026 (2025-08-05) Ongoing development
Supported: 3.4[39] 22 October 2024 (2025-08-05) 22 October 2026 (2025-08-05) Ongoing development
Latest version: 3.5 LTS[40] 8 April 2025 (2025-08-05) 8 April 2030 (2025-08-05) (LTS)
  • Support for PQC algorithms (ML-KEM, ML-DSA and SLH-DSA)
  • Support for server side QUIC (RFC 9000)
  • Support for 3rd party QUIC stacks including 0-RTT support
  • Support added for opaque symmetric key objects (EVP_SKEY)
  • A new configuration option no-tls-deprecated-ec to disable support for TLS groups deprecated in RFC8422
  • A new configuration option enable-fips-jitter to make the FIPS provider to use the JITTER seed source
  • Support for central key generation in CMP
  • Support for multiple TLS keyshares and improved TLS key establishment group configurability
  • API support for pipelining in provided cipher algorithms
Ongoing development
Legend:
Unsupported
Supported
Latest version

Algorithms

[edit]

OpenSSL supports a number of different cryptographic algorithms:

Ciphers
AES, Blowfish, Camellia, ChaCha20, Poly1305, SEED, CAST-128, DES, IDEA, RC2, RC4, RC5, Triple DES, GOST 28147-89,[41] SM4
Cryptographic hash functions
MD5, MD4, MD2, SHA-1, SHA-2, SHA-3, RIPEMD-160, MDC-2, GOST R 34.11-94,[41] BLAKE2, Whirlpool,[42] SM3
Public-key cryptography
RSA, DSA, Diffie–Hellman key exchange, Elliptic curve, X25519, Ed25519, X448, Ed448, GOST R 34.10-2001,[41] SM2

(Perfect forward secrecy is supported using elliptic curve Diffie–Hellman since version 1.0.[43])

FIPS 140 validation

[edit]

FIPS 140 is a U.S. Federal program for the testing and certification of cryptographic modules. An early FIPS 140-1 certificate for OpenSSL's FOM 1.0 was revoked in July 2006 "when questions were raised about the validated module's interaction with outside software." The module was re-certified in February 2007 before giving way to FIPS 140-2.[44] OpenSSL 1.0.2 supported the use of the OpenSSL FIPS Object Module (FOM), which was built to deliver FIPS approved algorithms in a FIPS 140-2 validated environment.[45][46] OpenSSL controversially decided to categorize the 1.0.2 architecture as 'end of life' or 'EOL', effective December 31, 2019, despite objections that it was the only version of OpenSSL that was currently available with support for FIPS mode.[47] As a result of the EOL, many users were unable to properly deploy the FOM 2.0 and fell out of compliance because they did not secure extended support for the 1.0.2 architecture, although the FOM itself remained validated for eight months further.

The FIPS Object Module 2.0 remained FIPS 140-2 validated in several formats until September 1, 2020, when NIST deprecated the usage of FIPS 186-2 for Digital Signature Standard and designated all non-compliant modules as 'Historical'. This designation includes a caution to federal agencies that they should not include the module in any new procurements. All three of the OpenSSL validations were included in the deprecation – the OpenSSL FIPS Object Module (certificate #1747),[48] OpenSSL FIPS Object Module SE (certificate #2398),[49] and OpenSSL FIPS Object Module RE (certificate #2473).[50] Many 'private label' OpenSSL-based validations and clones created by consultants were also moved to the Historical List, although some FIPS validated modules with replacement compatibility avoided the deprecation, such as BoringCrypto from Google[51] and CryptoComply from SafeLogic.[52]

The OpenSSL Management Committee announced a change in the versioning scheme.

Due to this change, the major number of the next major version would have been doubled, since the OpenSSL FIPS module already occupied this number. Therefore, the decision was made to skip the OpenSSL 2.0 version number and continue with OpenSSL 3.0 .

OpenSSL 3.0 restored FIPS mode and underwent FIPS 140-2 testing, but with significant delays: The effort was first kicked off in 2016 with support from SafeLogic[53][54][55] and further support from Oracle in 2017,[56][57] but the process has been challenging.[58]

On October 20, 2020, the OpenSSL FIPS Provider 3.0 was added to the CMVP Implementation Under Test List, which reflected an official engagement with a testing lab to proceed with a FIPS 140-2 validation. This resulted in a slew of certifications in the following months.[59]

Licensing

[edit]

OpenSSL was dual-licensed under the OpenSSL License and the SSLeay License, which means that the terms of either licenses can be used.[60] The OpenSSL License is Apache License 1.0 and SSLeay License bears some similarity to a 4-clause BSD License. As the OpenSSL License was Apache License 1.0, but not Apache License 2.0, it requires the phrase "this product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit" to appear in advertising material and any redistributions (Sections 3 and 6 of the OpenSSL License). Due to this restriction, the OpenSSL License and the Apache License 1.0 are incompatible with the GNU GPL.[61] Some GPL developers have added an OpenSSL exception to their licenses that specifically permits using OpenSSL with their system. GNU Wget and climm both use such exceptions.[62][63] Some packages (like Deluge) explicitly modify the GPL license by adding an extra section at the beginning of the license documenting the exception.[64] Other packages use the LGPL-licensed GnuTLS, BSD-licensed Botan, or MPL-licensed NSS, which perform the same task.

OpenSSL announced in August 2015 that it would require most contributors to sign a Contributor License Agreement (CLA), and that OpenSSL would eventually be relicensed under the terms of Apache License 2.0.[65] This process commenced in March 2017,[66] and was complete in 2018.[67]

On 7 September 2021, OpenSSL 3.0.0 was released under the Apache License 2.0.[68]

Notable vulnerabilities

[edit]

Denial of service: ASN.1 parsing

[edit]

OpenSSL 0.9.6k has a bug where certain ASN.1 sequences triggered a large number of recursions on Windows machines, discovered on November 4, 2003. Windows could not handle large recursions correctly, so OpenSSL would crash as a result. Being able to send arbitrary large numbers of ASN.1 sequences would cause OpenSSL to crash as a result.

OCSP stapling vulnerability

[edit]

When creating a handshake, the client could send an incorrectly formatted ClientHello message, leading to OpenSSL parsing more than the end of the message. Assigned the identifier CVE-2011-0014 by the CVE project, this affected all OpenSSL versions 0.9.8h to 0.9.8q and OpenSSL 1.0.0 to 1.0.0c. Since the parsing could lead to a read on an incorrect memory address, it was possible for the attacker to cause a DoS. It was also possible that some applications expose the contents of parsed OCSP extensions, leading to an attacker being able to read the contents of memory that came after the ClientHello.[69]

ASN.1 BIO vulnerability

[edit]

When using Basic Input/Output (BIO)[70] or FILE based functions to read untrusted DER format data, OpenSSL is vulnerable. This vulnerability was discovered on April 19, 2012, and was assigned the CVE identifier CVE-2012-2110. While not directly affecting the SSL/TLS code of OpenSSL, any application that was using ASN.1 functions (particularly d2i_X509 and d2i_PKCS12) were also not affected.[71]

SSL, TLS and DTLS plaintext recovery attack

[edit]

In handling CBC cipher-suites in SSL, TLS, and DTLS, OpenSSL was found vulnerable to a timing attack during the MAC processing. Nadhem Alfardan and Kenny Paterson discovered the problem, and published their findings[72] on February 5, 2013. The vulnerability was assigned the CVE identifier CVE-2013-0169.

Predictable private keys (Debian-specific)

[edit]

OpenSSL's pseudo-random number generator acquires entropy using complex programming methods. To keep the Valgrind analysis tool from issuing associated warnings, a maintainer of the Debian distribution applied a patch to Debian's variant of the OpenSSL suite, which inadvertently broke its random number generator by limiting the overall number of private keys it could generate to 32,768.[73][74] The broken version was included in the Debian release of September 17, 2006 (version 0.9.8c-1), also compromising other Debian-based distributions, for example Ubuntu. Ready-to-use exploits are easily available.[75]

The error was reported by Debian on May 13, 2008. On the Debian 4.0 distribution (etch), these problems were fixed in version 0.9.8c-4etch3, while fixes for the Debian 5.0 distribution (lenny) were provided in version 0.9.8g-9.[76]

Heartbleed

[edit]
A logo representing the Heartbleed bug

OpenSSL versions 1.0.1 through 1.0.1f have a severe memory handling bug in their implementation of the TLS Heartbeat Extension that could be used to reveal up to 64 KB of the application's memory with every heartbeat[77][78] (CVE-2014-0160). By reading the memory of the web server, attackers could access sensitive data, including the server's private key.[79] This could allow attackers to decode earlier eavesdropped communications if the encryption protocol used does not ensure perfect forward secrecy. Knowledge of the private key could also allow an attacker to mount a man-in-the-middle attack against any future communications.[citation needed] The vulnerability might also reveal unencrypted parts of other users' sensitive requests and responses, including session cookies and passwords, which might allow attackers to hijack the identity of another user of the service.[80]

At its disclosure on April 7, 2014, around 17% or half a million of the Internet's secure web servers certified by trusted authorities were believed to have been vulnerable to the attack.[81] However, Heartbleed can affect both the server and client.

CCS injection vulnerability

[edit]

The CCS Injection Vulnerability (CVE-2014-0224) is a security bypass vulnerability that results from a weakness in OpenSSL methods used for keying material.[82]

This vulnerability can be exploited through the use of a man-in-the-middle attack,[83] where an attacker may be able to decrypt and modify traffic in transit. A remote unauthenticated attacker could exploit this vulnerability by using a specially crafted handshake to force the use of weak keying material. Successful exploitation could lead to a security bypass condition where an attacker could gain access to potentially sensitive information. The attack can only be performed between a vulnerable client and server.

OpenSSL clients are vulnerable in all versions of OpenSSL before the versions 0.9.8za, 1.0.0m and 1.0.1h. Servers are only known to be vulnerable in OpenSSL 1.0.1 and 1.0.2-beta1. Users of OpenSSL servers earlier than 1.0.1 are advised to upgrade as a precaution.[84]

ClientHello sigalgs DoS

[edit]

This vulnerability (CVE-2015-0291) allows anyone to take a certificate, read its contents and modify it accurately to abuse the vulnerability causing a certificate to crash a client or server. If a client connects to an OpenSSL 1.0.2 server and renegotiates with an invalid signature algorithms extension, a null-pointer dereference occurs. This can cause a DoS attack against the server.

A Stanford Security researcher, David Ramos, had a private exploit and presented it to the OpenSSL team, which then patched the issue.

OpenSSL classified the bug as a high-severity issue, noting version 1.0.2 was found vulnerable.[85]

Key recovery attack on Diffie–Hellman small subgroups

[edit]

This vulnerability (CVE-2016-0701) allows, when some particular circumstances are met, to recover the OpenSSL server's private Diffie–Hellman key. An Adobe System Security researcher, Antonio Sanso, privately reported the vulnerability.

OpenSSL classified the bug as a high-severity issue, noting only version 1.0.2 was found vulnerable.[86]

Forks

[edit]

Agglomerated SSL

[edit]

In 2009, after frustrations with the original OpenSSL API, Marco Peereboom, an OpenBSD developer at the time, forked the original API by creating Agglomerated SSL (assl),[87] which reuses OpenSSL API under the hood, but provides a much simpler external interface.[88] It has since been deprecated in light of the LibreSSL fork circa 2015.

LibreSSL

[edit]

In April 2014 in the wake of Heartbleed, members of the OpenBSD project forked OpenSSL starting with the 1.0.1g branch, to create a project named LibreSSL.[89] In the first week of pruning the OpenSSL's codebase, more than 90,000 lines of C code had been removed from the fork.[90]

BoringSSL

[edit]

In June 2014, Google announced its own fork of OpenSSL dubbed BoringSSL.[91] Google plans to co-operate with OpenSSL and LibreSSL developers.[92][93][94] Google has since developed a new library, Tink, based on BoringSSL.[95]

AWS-LC

[edit]

In September 2020, it was released as a general-purpose cryptographic library maintained by the Amazon Web Services Cryptography team to be used in the AWS cloud computing platform. It ?s based on code from the OpenSSL and BoringSSL projects.[96]

QuicTLS

[edit]

It's a collaborative fork between Akamai and Microsoft, based on OpenSSL 3.3 release, and with some features and fixes cherry-picked from the current OpenSSL repo.[97]

Criticisms

[edit]

Backwards compatibility

[edit]

Among developers communities, OpenSSL is often cited for introducing API compatibility breakage with each new major version,[98][99][100][101] which requires software adaptations that tend to delay new version adoptions.[102] This, combined with the fact that previous releases are generally maintained for no more than two years after a new major one is released[28] tends to force some vendors to anticipate software migrations very early while still having little time left[103] to update to a new release, sometimes at the risk of losing some compatibility with existing software[104][105] or risking regressions.[106][107]

Delay between releases

[edit]

While long-term support (LTS) releases are maintained for 5 years,[12] accumulated delays in release time frames tend to force operating system vendors to stay on the last supported release longer, leaving less margin when the new version is available. For example, OpenSSL 3.0 was initially expected for Q4 2019[47] and was finally issued 21 months later[28] without extending the expected end of support for previously supported version 1.1.1, and this despite the significant changes that required adaptations to existing software.

Significant performance regressions

[edit]

The reduced support delay of version 1.1.1 mentioned above causes further concerns to users whose workloads are sensitive to performance. Some time after general availability of 3.0, some users started to report serious performance regressions affecting this version in multi-threaded environments, many citing the inefficient use of locks in frequent low-level operations, citing slowdowns from 80 to 400 times.[108][109][110][111][112][113][114][115] The OpenSSL team has created a meta-issue to try to centralize reports of such massive performance regressions.[116] About half of these reporters indicate the impossibility for them to upgrade to 3.0 from earlier versions, adding to the trouble caused by the limited support time left on previous version 1.1.1.

Consideration for users' requirements

[edit]

While the QUIC transport layer was being worked on to support the third version of the HTTP protocol, it was proposed to use TLS to provide security,[117] and identified that some adaptations to TLS libraries would be needed. Such modifications were brought to BoringSSL[118] which was the library being primarily used by QUIC developers by then, and later ported to other libraries.[119] A port of this work was quickly proposed to OpenSSL.[120] While some discussion started the same day, it quickly stalled and was first blocked on license considerations,[120] then kept on hold once these concerns were cleared. Finally 10 months later the OpenSSL Management Committee announced on a blog post[121] that this patch set would not be adopted for 3.0 on the fear that the API would change over time. Finally more than one year after planned release of 3.0 which was still not coming, a team of volunteers from Akamai and Microsoft decided to fork the project as QuicTLS[122] and support these patches on top of the OpenSSL code in order to unblock QUIC development. This action was generally welcome by the community. Finally after OpenSSL 3.0 was finally released, the QUIC patch set was reconsidered and decided against,[123] causing tens to hundreds of reactions of disappointment among the community.[120] The pull request was closed, while users felt the need to publicly express their disappointment,[124] or beg operating system vendors to support the alternative QuicTLS fork,[125][126] or seek for alternative solutions.[127] Finally Rich Salz, co-founder of the QuicTLS fork, announced[127] his interest in seeing an Apache project forked from QuicTLS. As of 25 February 2023 there is still no QUIC-compatible long-term supported TLS library available by default in operating systems without requiring end-users to rebuild it themselves from sources.

See also

[edit]

Notes

[edit]
  1. ^ The major version 2.0.0 was skipped due to its previous use in the OpenSSL FIPS module.[30]

References

[edit]
  1. ^ "OpenSSL 3.5.1". July 1, 2025. Retrieved July 1, 2025.
  2. ^ "/source/license.html". www.openssl.org. Archived from the original on January 18, 2019. Retrieved March 3, 2021.
  3. ^ "OpenSSL License | Software Package Data Exchange (SPDX)". spdx.org.
  4. ^ Laurie, Ben (January 6, 1999). "Announce: OpenSSL (Take 2)". ssl-users (Mailing list). Archived from the original on March 23, 2019. Retrieved October 29, 2018.
  5. ^ "New Committers". OpenSSL Software Foundation. May 20, 2019. Archived from the original on October 14, 2024. Retrieved October 11, 2024.
  6. ^ "OpenSSL Management Committee". OpenSSL Software Foundation. Archived from the original on July 22, 2018. Retrieved November 3, 2019.
  7. ^ "OpenSSL Committers". OpenSSL Software Foundation. Archived from the original on July 22, 2018. Retrieved November 3, 2019.
  8. ^ "OpenSSL Annual Report 2024" (PDF).
  9. ^ Marquess, Steve (January 19, 2017). "Akamai sponsors TLS 1.3". openssl-announce (Mailing list). Archived from the original on February 1, 2017. Retrieved November 9, 2018.
  10. ^ "OpenSSL – Changelog". OpenSSL Software Foundation. Archived from the original on September 13, 2016. Retrieved September 26, 2016.
  11. ^ "OpenSSL Releases". GitHub. Retrieved December 6, 2022.
  12. ^ a b "OpenSSL Library – Release Strategy". OpenSSL Software Foundation. Archived from the original on December 9, 2024. Retrieved August 1, 2024.
  13. ^ a b c d e f g h "OpenSSL 0.9.x series notes". GitHub. Retrieved December 6, 2022.
  14. ^ "OpenSSL 1.0.0 series notes". GitHub. Retrieved December 6, 2022.
  15. ^ "OpenSSL 1.0.1 series notes". GitHub. Retrieved December 6, 2022.
  16. ^ R. Seggelmann; M. Tuexen; M. Williams (February 2012). Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) Heartbeat Extension. Internet Engineering Task Force. doi:10.17487/RFC6520. ISSN 2070-1721. RFC 6520. Proposed Standard. Updated by RFC 8447.
  17. ^ E. Rescorla (January 2010). Keying Material Exporters for Transport Layer Security (TLS). Internet Engineering Task Force. doi:10.17487/RFC5705. ISSN 2070-1721. RFC 5705. Proposed Standard. Updated by RFC 8446 and 8447.
  18. ^ D. McGrew; E. Rescorla (May 2010). Datagram Transport Layer Security (DTLS) Extension to Establish Keys for the Secure Real-time Transport Protocol (SRTP). Internet Engineering Task Force. doi:10.17487/RFC5764. ISSN 2070-1721. RFC 5764. Proposed Standard. Updated by RFC 7983 and 9443.
  19. ^ "OpenSSL 1.0.2 series notes". GitHub. Retrieved December 6, 2022.
  20. ^ "OpenSSL 1.1.0 series notes". GitHub. Retrieved December 6, 2022.
  21. ^ J-P. Aumasson (October 2015). M-J. Saarinen (ed.). The BLAKE2 Cryptographic Hash and Message Authentication Code (MAC). Independent Submission. doi:10.17487/RFC7693. ISSN 2070-1721. RFC 7693. Informational.
  22. ^ Y. Nir; A. Langley (June 2018). ChaCha20 and Poly1305 for IETF Protocols. Internet Research Task Force. doi:10.17487/RFC8439. ISSN 2070-1721. RFC 8439. Informational. Obsoletes RFC 7539.
  23. ^ a b A. Langley; M. Hamburg; S. Turner (January 2016). Elliptic Curves for Security. Internet Engineering Task Force. doi:10.17487/RFC7748. ISSN 2070-1721. RFC 7748. Informational.
  24. ^ a b Caswell, Matt (September 11, 2018). "OpenSSL 1.1.1 Is Released". OpenSSL Blog. OpenSSL Foundation. Retrieved October 11, 2024.
  25. ^ "OpenSSL 1.1.1 series notes". GitHub. Retrieved December 6, 2022.
  26. ^ Caswell, Matt (February 8, 2018). "Using TLS1.3 With OpenSSL". OpenSSL Blog. OpenSSL Foundation. Retrieved October 11, 2024.
  27. ^ B. Kaliski; A. Rusch; J. Johnsson; A. Rusch (November 2016). K. Moriarty (ed.). PKCS #1: RSA Cryptography Specifications Version 2.2. Internet Engineering Task Force. doi:10.17487/RFC8017. ISSN 2070-1721. RFC 8017. Informational. Obsoletes RFC 3447.
  28. ^ a b c "OpenSSL 3.0 Has Been Released!". OpenSSL Blog. September 7, 2021. Retrieved October 11, 2024.
  29. ^ "OpenSSL 3.0 series notes". GitHub. Retrieved December 6, 2022.
  30. ^ a b Matt Caswell (November 28, 2018). "The Holy Hand Grenade of Antioch". OpenSSL Blog. Retrieved October 11, 2024.
  31. ^ "OpenSSL 3.1 Final Release". OpenSSL Blog. March 7, 2023. Retrieved October 11, 2024.
  32. ^ "OpenSSL 3.1 series notes". GitHub. Retrieved March 15, 2023.
  33. ^ "OpenSSL 3.2.0 Final Release". OpenSSL Blog. November 23, 2023. Archived from the original on December 7, 2024. Retrieved October 11, 2024.
  34. ^ "OpenSSL 3.2 series notes". GitHub. Retrieved November 24, 2023.
  35. ^ A. Ghedini; V. Vasiliev (December 2020). TLS Certificate Compression. Internet Engineering Task Force. doi:10.17487/RFC8879. ISSN 2070-1721. RFC 8879. Proposed Standard.
  36. ^ T. Pornin (August 2013). Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA). Independent Submission. doi:10.17487/RFC6979. ISSN 2070-1721. RFC 6979. Informational.
  37. ^ J. Gilmore; S. Weiler; T. Kivinen (June 2014). P. Wouters; H. Tschofenig (eds.). Using Raw Public Keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS). Internet Engineering Task Force. doi:10.17487/RFC7250. ISSN 2070-1721. RFC 7250. Proposed Standard.
  38. ^ "OpenSSL 3.3 Final Release". OpenSSL Blog. April 10, 2024. Retrieved October 11, 2024.
  39. ^ "OpenSSL 3.4 Final Release". OpenSSL Blog. October 22, 2024. Archived from the original on December 8, 2024. Retrieved November 22, 2024.
  40. ^ "OpenSSL 3.5 Final Release". OpenSSL Blog. April 8, 2025. Archived from the original on April 25, 2025. Retrieved April 28, 2025.
  41. ^ a b c "GOST engine OpenSSL 1.0.0 README". cvs.openssl.org. Archived from the original on April 15, 2013.
  42. ^ "OpenSSL source code, directory crypto/whrlpool". GitHub. Archived from the original on February 17, 2019. Retrieved August 29, 2017.
  43. ^ "Protecting data for the long term with forward secrecy". Archived from the original on March 4, 2016. Retrieved November 5, 2012.
  44. ^ "NIST recertifies open source encryption module". gcn.com. Archived from the original on October 10, 2007.
  45. ^ "FIPS-140". openssl.org. Retrieved November 12, 2019.
  46. ^ "OpenSSL User Guide for the OpenSSL FIPS Object Module v2.0" (PDF). openssl.org. March 14, 2017. Archived (PDF) from the original on June 9, 2020. Retrieved November 12, 2019.
  47. ^ a b "Update on 3.0 Development, FIPS and 1.0.2 EOL". OpenSSL Blog. November 7, 2019. Retrieved October 11, 2024.
  48. ^ "Cryptographic Module Validation Program Certificate #1747". Computer Security Resource Center. October 11, 2016.
  49. ^ "Cryptographic Module Validation Program Certificate #2398". Computer Security Resource Center. October 11, 2016. Archived from the original on October 26, 2020. Retrieved October 29, 2020.
  50. ^ "Cryptographic Module Validation Program Certificate #2473". Computer Security Resource Center. October 11, 2016.
  51. ^ "Cryptographic Module Validation Program search results". Computer Security Resource Center. October 11, 2016.
  52. ^ "Cryptographic Module Validation Program search results". Computer Security Resource Center. October 11, 2016.
  53. ^ Schneider, Troy K. (July 20, 2016). "Getting government approval of a more secure OpenSSL". GCN: Technology, Tools, and Tactics for Public Sector IT. Archived from the original on May 9, 2021. Retrieved October 29, 2020.
  54. ^ Waterman, Shaun (July 21, 2016). "SafeLogic saves the day for feds' use of OpenSSL". FedScoop.
  55. ^ Rashid, Fahmida Y. (July 26, 2016). "Reworked OpenSSL on track for government validation". InfoWorld.
  56. ^ Wells, Joyce (August 3, 2017). "Oracle, SafeLogic and OpenSSL Join Forces to Update FIPS Module". Database Trends and Applications.
  57. ^ Kerner, Sean Michael (August 4, 2017). "Oracle Joins SafeLogic to Develop FIPS Module for OpenSSL Security". eWeek.
  58. ^ "OpenSSL 3.0 Alpha7 Release". OpenSSL Blog. October 20, 2020. Archived from the original on October 14, 2024. Retrieved October 11, 2024.
  59. ^ "Cryptographic Module Validation Program: OpenSSL". Computer Security Resource Center. October 11, 2016. Archived from the original on April 14, 2021. Retrieved September 24, 2021.
  60. ^ "OpenSSL: Source, License". openssl.org. Archived from the original on January 18, 2019. Retrieved February 5, 2015.
  61. ^ "Licenses – Free Software Foundation". fsf.org. Archived from the original on January 24, 2008. Retrieved January 4, 2008.
  62. ^ "WGET 1.10.2 for Windows (win32)". users.ugent.be. Archived from the original on January 2, 2008.
  63. ^ "Releases of source and binaries". climm.org. Archived from the original on February 12, 2011. Retrieved November 30, 2010.
  64. ^ "Deluge LICENSE file". deluge-torrent.org. Archived from the original on December 3, 2013. Retrieved January 24, 2013.
  65. ^ Salz, Rich (August 1, 2015). "License Agreements and Changes Are Coming". openssl.org. Retrieved October 11, 2024.
  66. ^ "OpenSSL Re-licensing to Apache License v. 2.0 To Encourage Broader Use with Other FOSS Projects and Products". March 23, 2017. Archived from the original on July 18, 2017. Retrieved August 6, 2018.
  67. ^ Lee, Victoria; Radcliffe, Mark; Stevenson, Chris (5 February 2019). "Top 10 FOSS legal developments of 2018". Opensource.com, Red Hat. Archived from the original on 5 February 2019. Retrieved 28 September 2019. The OpenSSL project announced that it had completed its shift from the OpenSSL/SSLeay license to the Apache Software License version 2 (ASLv2).
  68. ^ "OpenSSL 3.0 License Change". September 22, 2021. Archived from the original on January 17, 2025. Retrieved September 24, 2021.
  69. ^ "OpenSSL Updates Fix Critical Security Vulnerabilities". August 9, 2014. Archived from the original on August 26, 2014. Retrieved August 25, 2014.
  70. ^ "OpenSSL ASN.1 asn1_d2i_read_bio() Heap Overflow Vulnerability". Cisco. Archived from the original on June 10, 2016. Retrieved May 9, 2016.
  71. ^ "ASN1 BIO vulnerability". OpenSSL. Archived from the original on March 2, 2015. Retrieved February 5, 2015.
  72. ^ "On the Security of RC4 in TLS". Royal Holloway Department of Information Security. Archived from the original on March 15, 2013. Retrieved April 29, 2014.
  73. ^ "research!rsc: Lessons from the Debian/OpenSSL Fiasco". research.swtch.com. Retrieved August 12, 2015.
  74. ^ "SSLkeys". Debian Wiki. Retrieved June 19, 2015.
  75. ^ "Debian OpenSSL – Predictable PRNG Bruteforce SSH Exploit Python". Exploits Database. June 1, 2008. Archived from the original on February 6, 2025. Retrieved August 12, 2015.
  76. ^ "DSA-1571-1 openssl – predictable random number generator". Debian Project. May 13, 2008. Archived from the original on March 9, 2011. Retrieved August 5, 2012.
  77. ^ OpenSSL.org (April 7, 2014). "OpenSSL Security Advisory [07 Apr 2014]". Archived from the original on April 8, 2014. Retrieved April 9, 2014.
  78. ^ OpenSSL (April 7, 2014). "TLS heartbeat read overrun (CVE-2014-0160)". Archived from the original on April 8, 2014. Retrieved April 8, 2014.
  79. ^ Codenomicon Ltd (April 8, 2014). "Heartbleed Bug". Archived from the original on April 7, 2014. Retrieved April 8, 2014.
  80. ^ "Why Heartbleed is dangerous? Exploiting CVE-2014-0160". IPSec.pl. 2014. Archived from the original on April 8, 2014. Retrieved April 8, 2014.
  81. ^ Mutton, Paul (April 8, 2014). "Half a million widely trusted websites vulnerable to Heartbleed bug". Netcraft Ltd. Archived from the original on November 19, 2014. Retrieved April 8, 2014.
  82. ^ "OpenSSL continues to bleed out more flaws – more critical vulnerabilities found". Cyberoam Threat Research Labs. 2014. Archived from the original on June 19, 2014. Retrieved June 13, 2014.
  83. ^ "CVE-2014-0224". CVE. 2014. Archived from the original on August 1, 2014. Retrieved June 13, 2014.
  84. ^ "OpenSSL Security Advisory". OpenSSL. June 5, 2014. Archived from the original on April 30, 2024. Retrieved June 13, 2014.
  85. ^ "OpenSSL Patches Severe Denial-of-Service Vulnerability". Brandon Stosh. March 20, 2015. Archived from the original on April 2, 2015. Retrieved March 20, 2015.
  86. ^ Goodlin, Dan (January 28, 2016). "High-severity bug in OpenSSL allows attackers to decrypt HTTPS traffic". Ars Technica. Archived from the original on November 20, 2016. Retrieved June 14, 2017.
  87. ^ "Agglomerated SSL". GitHub. September 7, 2010. Archived from the original on December 9, 2024. Retrieved December 9, 2024.
  88. ^ "security/assl: assl-1.5.0p0v0 – hide awful SSL API in a sane interface". OpenBSD ports. May 22, 2014. Archived from the original on February 10, 2015. Retrieved February 10, 2015.
  89. ^ "OpenBSD has started a massive strip-down and cleanup of OpenSSL". OpenBSD journal. April 15, 2014. Archived from the original on July 1, 2014. Retrieved April 21, 2014.
  90. ^ "OpenBSD forks, prunes, fixes OpenSSL". ZDNet. April 21, 2014. Archived from the original on April 21, 2014. Retrieved April 21, 2014.
  91. ^ "BoringSSL". Git at Google. Archived from the original on February 17, 2018. Retrieved December 28, 2015.
  92. ^ "Google unveils independent 'fork' of OpenSSL called 'BoringSSL'". Ars Technica. June 21, 2014. Archived from the original on June 23, 2014. Retrieved June 14, 2017.
  93. ^ "BoringSSL". Adam Langley's Weblog. June 20, 2014. Archived from the original on June 1, 2018. Retrieved September 22, 2015.
  94. ^ "BoringSSL wants to kill the excitement that led to Heartbleed". Sophos. June 24, 2014. Archived from the original on February 14, 2018. Retrieved October 24, 2016.
  95. ^ Buchanan, Bill (August 30, 2018). "Goodbye OpenSSL, and Hello To Google Tink". Medium. Retrieved April 4, 2019.
  96. ^ "AWS-LC is a general-purpose cryptographic library". GitHub. September 4, 2020. Retrieved December 8, 2024.
  97. ^ "The official repository for the QuicTLS project". GitHub. May 7, 2025. Retrieved May 7, 2025.
  98. ^ "OpenSSL 3 breaks webpack build · Issue #22305 · brave/brave-browser". GitHub. Archived from the original on December 8, 2024. Retrieved February 25, 2023.
  99. ^ "openssl version 3.0 in arch? / Newbie Corner / Arch Linux Forums". bbs.archlinux.org. Archived from the original on May 16, 2024. Retrieved February 25, 2023.
  100. ^ "OpenSSL 3.0 transition plans". Ubuntu Community Hub. April 6, 2022. Archived from the original on December 25, 2024. Retrieved February 25, 2023.
  101. ^ "OpenSSL 3.0 Compatibility · Issue #597 · nginx/unit". GitHub. Archived from the original on December 8, 2024. Retrieved February 25, 2023.
  102. ^ "Our future with OpenSSL". Discussions on Python.org. November 28, 2022. Archived from the original on February 25, 2023. Retrieved February 25, 2023.
  103. ^ "The experience of bringing OpenSSL 3.0 into Red Hat Enterprise Linux and Fedora". www.redhat.com.
  104. ^ "Compile against OpenSSL 3.X". groups.google.com. Archived from the original on December 8, 2024. Retrieved February 25, 2023.
  105. ^ "ESET Management Agent (RHEL 9.x, OpenSSL 3.0.x)". ESET Security Forum. June 6, 2022. Archived from the original on December 9, 2024. Retrieved February 25, 2023.
  106. ^ "Issue 46313: SSLObject does not raise SSLEOFError on OpenSSL 3 - Python tracker". bugs.python.org. Archived from the original on December 8, 2024. Retrieved February 25, 2023.
  107. ^ "RHEL 9 : openssl (RHSA-2022:6224)". www.tenable.com. Archived from the original on December 8, 2024. Retrieved February 25, 2023.
  108. ^ "Massive performance degradation in OpenSsl 3.0 if used in a heavy multi threaded server application · Issue #17064 · openssl/openssl". GitHub. Archived from the original on December 8, 2024. Retrieved February 25, 2023.
  109. ^ "Performance issue with Openssl 3.0 in multi threaded application when using d2i_x509 · Issue #17950 · openssl/openssl". GitHub. Archived from the original on December 8, 2024. Retrieved February 25, 2023.
  110. ^ "Severe efficiency degradation of credential loading in comparison to 1.1.1 · Issue #18814 · openssl/openssl". GitHub. Archived from the original on December 7, 2024. Retrieved February 25, 2023.
  111. ^ "3.0 performance degraded due to locking · Issue #20286 · openssl/openssl". GitHub.
  112. ^ "High cpu usage for outbound ssl requests after upgrading from v16.15.0 to v18.1.0 · Issue #43128 · nodejs/node". GitHub. Archived from the original on December 8, 2024. Retrieved February 25, 2023.
  113. ^ "Massive performance degradation in OpenSsl 3.0 FIPS provider · Issue #18472 · openssl/openssl". GitHub. Archived from the original on December 8, 2024. Retrieved February 25, 2023.
  114. ^ "Performance measurements · Issue #16791 · openssl/openssl". GitHub. Archived from the original on December 8, 2024. Retrieved February 25, 2023.
  115. ^ "PEM/DER decoding of PKCS8 RSA private keys are 80 times slower in 3.0 · Issue #15199 · openssl/openssl". GitHub. Archived from the original on December 8, 2024. Retrieved February 25, 2023.
  116. ^ "3.0 Performance problems · Issue #17627 · openssl/openssl". GitHub. Archived from the original on December 8, 2024. Retrieved February 25, 2023.
  117. ^ Thomson, Martin; Turner, Sean (January 14, 2017). "Using Transport Layer Security (TLS) to Secure QUIC". Archived from the original on December 8, 2024. Retrieved November 27, 2023 – via IETF.
  118. ^ "221 - boringssl - A fork of OpenSSL that is designed to meet Google's needs - Monorail". bugs.chromium.org.
  119. ^ "Support QUIC TLS API (#826) · Issues · gnutls / GnuTLS · GitLab". GitLab. September 4, 2019. Archived from the original on December 8, 2024. Retrieved February 25, 2023.
  120. ^ a b c "WIP: master QUIC support by tmshort · Pull Request #8797 · openssl/openssl". GitHub. Archived from the original on January 21, 2025. Retrieved February 25, 2023.
  121. ^ "QUIC and OpenSSL". OpenSSL Blog. February 17, 2020. Retrieved October 11, 2024.
  122. ^ "quictls announce on twitter".
  123. ^ "OMC Release Requirements". www.mail-archive.com. Archived from the original on January 21, 2025. Retrieved February 25, 2023.
  124. ^ "The QUIC API OpenSSL will not provide | daniel.haxx.se". October 25, 2021. Archived from the original on January 21, 2025. Retrieved February 25, 2023.
  125. ^ Tarreau, Willy (October 27, 2021). "[Pkg-openssl-devel] Any intent to maintain quictls ?". Archived from the original on December 7, 2024. Retrieved February 25, 2023.
  126. ^ "Bug#1011391: openssl: please support quictls patchset". groups.google.com. Archived from the original on December 8, 2024. Retrieved February 25, 2023.
  127. ^ a b "HTTP/3 support · Issue #680 · haproxy/haproxy". GitHub. Archived from the original on December 7, 2024. Retrieved February 25, 2023.
[edit]
spiderking是什么牌子 喉咙痛吃什么药好得快 后悔是什么意思 症瘕是什么意思 喉咙干疼吃什么药
枸杞喝多了有什么坏处 周知是什么意思 1984年属鼠五行属什么 雉是什么动物 门口放什么植物好风水
来例假吃什么水果好 肾虚吃什么中成药 joma是什么牌子 一什么小船 荔枝有什么作用
膝盖响是什么原因 老鼠屎长什么样子 血糖高是什么原因引起的 小鱼际发红预示着什么 波子是什么车
阳痿吃什么好hcv9jop2ns0r.cn 益生菌有什么好处hcv7jop4ns6r.cn 根是什么意思wzqsfys.com 静若幽兰什么意思hcv8jop2ns4r.cn 拉肚子出血是什么原因jiuxinfghf.com
香港警司是什么级别hcv9jop7ns0r.cn 每年什么时候最热hcv9jop4ns4r.cn 咽喉痛吃什么药好得快hcv9jop0ns7r.cn 幡然是什么意思hcv8jop8ns3r.cn 八百里加急是什么意思hcv8jop9ns6r.cn
五蕴皆空是什么意思hcv9jop1ns4r.cn 赖是什么意思hcv9jop5ns8r.cn mri是什么检查mmeoe.com 1.8号是什么星座hcv8jop5ns9r.cn 中耳炎什么症状hcv8jop6ns0r.cn
牙齿黄用什么牙膏fenrenren.com 什么是otchcv8jop4ns6r.cn 11月1日什么星座hcv8jop0ns4r.cn 月经期间吃什么水果beikeqingting.com 局部皮肤瘙痒什么原因hcv9jop2ns9r.cn
百度