* ceph + -lssl @ 2016-02-24 5:09 Marcus Watts 2016-02-26 20:43 ` Yehuda Sadeh-Weinraub 0 siblings, 1 reply; 7+ messages in thread From: Marcus Watts @ 2016-02-24 5:09 UTC (permalink / raw) To: ceph-devel I've been working on better integrating ssl int ceph. Currently, I have a branch, "wip-openssl" which I've pushed to github, which builds using gitbuilder, also builds with cmake. I haven't done much testing with this, so there may be some other business (with certs and such) to make this actually useful. commits to make this build: 1/ ba8bfab15255d4b321f200a617bc2e0335676482 automake: -lssl 2/ 5188536a6e42d9207d45dadc86700546ac12b1a2 cmake: ssl + crypto 3/ 96fe7c5745584158aa69223e3b2482fc9dcfc8fe automake: -lssl -lcrypto (not just -lssl) 4/ a23e063a7db4780f120a2199db55ce5ae816b829 git: used fixed version of civetweb. fixes a warning. There are some additional commits in wip-openssl to support build "out of tree". I'll post a separate message about that. -Marcus Watts ^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: ceph + -lssl 2016-02-24 5:09 ceph + -lssl Marcus Watts @ 2016-02-26 20:43 ` Yehuda Sadeh-Weinraub 2016-02-27 7:50 ` Marcus Watts 0 siblings, 1 reply; 7+ messages in thread From: Yehuda Sadeh-Weinraub @ 2016-02-26 20:43 UTC (permalink / raw) To: Marcus Watts; +Cc: ceph-devel I rebased these 4 commits on top of a recent master, and here's the new pull request: https://github.com/ceph/ceph/pull/7825 On Tue, Feb 23, 2016 at 9:09 PM, Marcus Watts <mwatts@redhat.com> wrote: > I've been working on better integrating ssl int ceph. > Currently, I have a branch, "wip-openssl" which I've pushed to > github, which builds using gitbuilder, also builds with cmake. > I haven't done much testing with this, so there may be some other > business (with certs and such) to make this actually useful. > > commits to make this build: > 1/ ba8bfab15255d4b321f200a617bc2e0335676482 > automake: -lssl > 2/ 5188536a6e42d9207d45dadc86700546ac12b1a2 > cmake: ssl + crypto > 3/ 96fe7c5745584158aa69223e3b2482fc9dcfc8fe > automake: -lssl -lcrypto (not just -lssl) > 4/ a23e063a7db4780f120a2199db55ce5ae816b829 > git: used fixed version of civetweb. > fixes a warning. > > There are some additional commits in wip-openssl to support > build "out of tree". I'll post a separate message about that. > > -Marcus Watts > -- > To unsubscribe from this list: send the line "unsubscribe ceph-devel" in > the body of a message to majordomo@vger.kernel.org > More majordomo info at http://vger.kernel.org/majordomo-info.html ^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: ceph + -lssl 2016-02-26 20:43 ` Yehuda Sadeh-Weinraub @ 2016-02-27 7:50 ` Marcus Watts 2016-02-27 12:49 ` Willem Jan Withagen 0 siblings, 1 reply; 7+ messages in thread From: Marcus Watts @ 2016-02-27 7:50 UTC (permalink / raw) To: Yehuda Sadeh-Weinraub; +Cc: ceph-devel On Fri, Feb 26, 2016 at 12:43:24PM -0800, Yehuda Sadeh-Weinraub wrote: > I rebased these 4 commits on top of a recent master, and here's the > new pull request: > > https://github.com/ceph/ceph/pull/7825 > > On Tue, Feb 23, 2016 at 9:09 PM, Marcus Watts <mwatts@redhat.com> wrote: > > I've been working on better integrating ssl int ceph. ... Thanks Yehuda for doing this. Matt pointed out in the pull request that cmake builds were failing on this branch. I've pushed a commit to fix that. -Marcus Watts ^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: ceph + -lssl 2016-02-27 7:50 ` Marcus Watts @ 2016-02-27 12:49 ` Willem Jan Withagen 2016-03-01 1:31 ` Marcus Watts 0 siblings, 1 reply; 7+ messages in thread From: Willem Jan Withagen @ 2016-02-27 12:49 UTC (permalink / raw) To: Marcus Watts, Yehuda Sadeh-Weinraub; +Cc: ceph-devel On 27-2-2016 08:50, Marcus Watts wrote: > On Fri, Feb 26, 2016 at 12:43:24PM -0800, Yehuda Sadeh-Weinraub wrote: >> I rebased these 4 commits on top of a recent master, and here's the >> new pull request: >> https://github.com/ceph/ceph/pull/7825 >> >> On Tue, Feb 23, 2016 at 9:09 PM, Marcus Watts <mwatts@redhat.com> wrote: >>> I've been working on better integrating ssl int ceph. > ... > > Thanks Yehuda for doing this. > > Matt pointed out in the pull request that cmake builds were failing > on this branch. I've pushed a commit to fix that. I know I'm not doing the work, but would it be possible to base the work on for example LibreSSL from OpenBSD or BoringSSL from Google. From the things I've seen and read about it, these libraries are (good) attempts to shed a lot of cruft of openssl resulting in a compacter and better build lib. Next to the history of OpenBSD which is "not all that bad" for security. And I'd expect Ceph to only use the more modern parts of the lib, and thus historical compatibility is not that important here. --WjW ^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: ceph + -lssl 2016-02-27 12:49 ` Willem Jan Withagen @ 2016-03-01 1:31 ` Marcus Watts 2016-03-02 22:58 ` Kyle Bader 0 siblings, 1 reply; 7+ messages in thread From: Marcus Watts @ 2016-03-01 1:31 UTC (permalink / raw) To: Willem Jan Withagen; +Cc: Yehuda Sadeh-Weinraub, ceph-devel On Sat, Feb 27, 2016 at 01:49:08PM +0100, Willem Jan Withagen wrote: > On 27-2-2016 08:50, Marcus Watts wrote: > > On Fri, Feb 26, 2016 at 12:43:24PM -0800, Yehuda Sadeh-Weinraub wrote: > >> I rebased these 4 commits on top of a recent master, and here's the > >> new pull request: > >> https://github.com/ceph/ceph/pull/7825 > >> > >> On Tue, Feb 23, 2016 at 9:09 PM, Marcus Watts <mwatts@redhat.com> wrote: > >>> I've been working on better integrating ssl int ceph. > > ... > > > > Thanks Yehuda for doing this. > > > > Matt pointed out in the pull request that cmake builds were failing > > on this branch. I've pushed a commit to fix that. > > I know I'm not doing the work, but would it be possible to base the work > on for example LibreSSL from OpenBSD or BoringSSL from Google. > > From the things I've seen and read about it, these libraries are (good) > attempts to shed a lot of cruft of openssl resulting in a compacter and > better build lib. > > Next to the history of OpenBSD which is "not all that bad" for security. > And I'd expect Ceph to only use the more modern parts of the lib, and > thus historical compatibility is not that important here. > --WjW > > > -- > To unsubscribe from this list: send the line "unsubscribe ceph-devel" in > the body of a message to majordomo@vger.kernel.org > More majordomo info at http://vger.kernel.org/majordomo-info.html I looked at libressl a bit. It still has the same license emcumbrances as openssl. So no real win there. And, since it's not packaged as part of many linux distributions, the gpl/ssleay license incompatibility issue becomes a real problem here. Hopefully a future version of libressl will adopt a plain bsd license. I know they were working hard to discard the crufty openssl build system, a good thing. When I worked with an earlier version of openssl (adding a new hash or encryption algorithm, I don't remember which today), I remember being disappointed at finding internal interfaces that just assumed various max sizes of things. I hope the libressl folks work on making those things better too. I'm not familiar with google's "boringSSL". Do you have some references for it? I won't have the time to look at it right now - but I don't mind learning at least a bit more about it. I see from wikipedia that it's yet another fork of openssl - will they fix the license issue? I did look (mostly superficially) at, botan libressl gnutls matrixssl mbed wolfssl cryptlib nss & apple's "secure transport" It was mostly superficial because my first question was "are there a lot of other people using this" aka "am I going to be debugging and supporting this myself"? -Marcus ^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: ceph + -lssl 2016-03-01 1:31 ` Marcus Watts @ 2016-03-02 22:58 ` Kyle Bader 2016-03-03 12:55 ` Willem Jan Withagen 0 siblings, 1 reply; 7+ messages in thread From: Kyle Bader @ 2016-03-02 22:58 UTC (permalink / raw) To: Marcus Watts; +Cc: Willem Jan Withagen, Yehuda Sadeh-Weinraub, ceph-devel > I looked at libressl a bit. It still has the same license emcumbrances > as openssl. So no real win there. And, since it's not packaged as part > of many linux distributions, the gpl/ssleay license incompatibility issue > becomes a real problem here. Hopefully a future version of libressl will > adopt a plain bsd license. I know they were working hard to discard > the crufty openssl build system, a good thing. When I worked with an > earlier version of openssl (adding a new hash or encryption algorithm, > I don't remember which today), I remember being disappointed at finding > internal interfaces that just assumed various max sizes of things. I hope > the libressl folks work on making those things better too. > > I'm not familiar with google's "boringSSL". Do you have some references > for it? I won't have the time to look at it right now - but I don't mind > learning at least a bit more about it. I see from wikipedia that it's > yet another fork of openssl - will they fix the license issue? > > I did look (mostly superficially) at, > botan libressl gnutls matrixssl mbed wolfssl cryptlib nss > & apple's "secure transport" > It was mostly superficial because my first question was "are there > a lot of other people using this" aka "am I going to be debugging > and supporting this myself"? BoringSSL https://boringssl.googlesource.com/boringssl/ This might also be worth a look: https://github.com/awslabs/s2n -- Kyle Bader ^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: ceph + -lssl 2016-03-02 22:58 ` Kyle Bader @ 2016-03-03 12:55 ` Willem Jan Withagen 0 siblings, 0 replies; 7+ messages in thread From: Willem Jan Withagen @ 2016-03-03 12:55 UTC (permalink / raw) To: Kyle Bader, Marcus Watts; +Cc: Yehuda Sadeh-Weinraub, ceph-devel On 2-3-2016 23:58, Kyle Bader wrote: >> I looked at libressl a bit. It still has the same license emcumbrances >> as openssl. So no real win there. And, since it's not packaged as part >> of many linux distributions, the gpl/ssleay license incompatibility issue >> becomes a real problem here. Hopefully a future version of libressl will >> adopt a plain bsd license. I know they were working hard to discard >> the crufty openssl build system, a good thing. When I worked with an >> earlier version of openssl (adding a new hash or encryption algorithm, >> I don't remember which today), I remember being disappointed at finding >> internal interfaces that just assumed various max sizes of things. I hope >> the libressl folks work on making those things better too. >> >> I'm not familiar with google's "boringSSL". Do you have some references >> for it? I won't have the time to look at it right now - but I don't mind >> learning at least a bit more about it. I see from wikipedia that it's >> yet another fork of openssl - will they fix the license issue? >> >> I did look (mostly superficially) at, >> botan libressl gnutls matrixssl mbed wolfssl cryptlib nss >> & apple's "secure transport" >> It was mostly superficial because my first question was "are there >> a lot of other people using this" aka "am I going to be debugging >> and supporting this myself"? > > BoringSSL > > https://boringssl.googlesource.com/boringssl/ > > This might also be worth a look: > > https://github.com/awslabs/s2n I myself have spoken to one of the people that works on integration of LibreSSL in FreeBSD ports (he lives in town here). And yes he tells me that it is a lot of work, but mainly because of the "liberties" that openssl allows. And even though LibreSSL attempts to be a plugin replacement, it are these edge corners which do work, but according the API should not, that create the porting pain. So that would be another argument of trying to see if you can hook this in. I'm sure you will find odd bits and pieces that do not work as expected. But in the end it will improve you code quality. Same feeling I have trying to port to FreeBSD. 99,9% is compatible, and sometimes Linuxisms creep in where the do not have to because POSIX is good enough. But you are right, on occassion you will hit a wall and damage you nose. On the other hand, I'm upgrading openssl in all environments I maintain for the 3 or 4th time in 2 years, because of major bugs in openssl. Doesn't say there are no bugs in the other implementations. But it was just a things I was wondering when I saw the implementation come by. And any implementation is beter than none. So thanx for doing the work. --WjW ^ permalink raw reply [flat|nested] 7+ messages in thread
end of thread, other threads:[~2016-03-03 12:57 UTC | newest] Thread overview: 7+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2016-02-24 5:09 ceph + -lssl Marcus Watts 2016-02-26 20:43 ` Yehuda Sadeh-Weinraub 2016-02-27 7:50 ` Marcus Watts 2016-02-27 12:49 ` Willem Jan Withagen 2016-03-01 1:31 ` Marcus Watts 2016-03-02 22:58 ` Kyle Bader 2016-03-03 12:55 ` Willem Jan Withagen
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox