From 40bf7c805e339ac470c761281baf8f7b0e9707fe Mon Sep 17 00:00:00 2001 From: Rich Salz Date: Tue, 17 Dec 2024 17:05:55 -0500 Subject: [PATCH] Revise for the state of the play now. --- index.html | 164 ++++++++++++++++++++++++++++++++++++++--------------- 1 file changed, 119 insertions(+), 45 deletions(-) diff --git a/index.html b/index.html index 297ca0b..6c80904 100644 --- a/index.html +++ b/index.html @@ -1,54 +1,128 @@ - + + - + + + - + + -

What This Is

-

This is a fork of OpenSSL to enable QUIC. In addition to the website, the official source distribution is at https://github.com/openssl/openssl. The OpenSSL README can be found at README-OpenSSL.md.

-

This fork adds an API that can be used by QUIC implementations for connection handshakes. Quoting the IETF Working group charter, QUIC is a "UDP-based, stream-multiplexing, encrypted transport protocol." If you don't need QUIC, you should use the official OpenSSL distributions.

-

The API's here are used by Microsoft's MsQuic, and Google's Chromium QUIC, and others.

-

We are not in competition with OpenSSL project. -We informed them of our plans to fork the code before we went public. -We do not speak for the OpenSSL project. -They have since announced their plans -to do their own QUIC implementation, now that the 3.0 release is done. -

There is a community need for a QUIC capable TLS library, for both the 3.0 and 1.1 streams. -This fork is intended as a stopgap solution to enable higher level frameworks and runtimes to use QUIC with the proven and reliable TLS functionality from OpenSSL. This fork will be maintained until OpenSSL officially provides reasonable support for QUIC implementations.

-

This fork can be considered a supported version of OpenSSL PR 8797. We will endeavor to track OpenSSL releases within a day or so, and there is an item below about how we'll follow their tagging.

-

On to the questions and answers.

-

What about branches?

-

We don't want to conflict with OpenSSL branch names. Our plan is to append +quic to upstream tag names to create our branches. Release tags will be the upstream tag name with -quic1 appended (where 1 will be the incrementing release number). For example, the OpenSSL tag openssl-3.0.10 would have a branch named openssl-3.0.10+quic and a first release tag of openssl-3.0.10-quic1. Please note that this is not compatible with semantic versioning, as any version with a -value suffix is sorted before the version (i.e. openssl-3.0.10-quic1 < openssl-3.0.10). Using a + can remediate this, but some release tools don't like the +.

-

How are you keeping current with OpenSSL?

-

(In other words, "What about rebasing?")

-

Our plan is to always rebase on top of an upstream release tag. In particular:

- -

What about library names?

-

Library names will be the same, but will use a different version number. The version numbers for the current OpenSSL libraries are 1.1 (for the 1.1.0 and 1.1.1 branches) and 3 (for the 3.0 branch). We will be prefixing 81 (ASCII for 'Q') to the version numbers to generate a unique version number.

- -

The SONAME of these libraries are all different, guaranteeing the correct library will be used.

-

...and the executable?

-

We currently do not have any plans to change the name, mainly because we haven't made any changes there. If you see a need, please open an issue.

-

The openssl version command will report that it is +quic enabled.

-

...and FIPS?

-

We are not doing anything with FIPS. This is actually good news: you should be able to load the OpenSSL 3.0 FIPS module into an application built against this fork and everything should Just Work™.

-

How can I contribute?

-

We want any code here to be acceptable to OpenSSL. This means that all contributors must have signed the appropriate contributor license agreements. We will not ask for copies of any paperwork, you just need to tell us that you've done so (and we might verify with OpenSSL). We are only interested in making it easier and better for at least the mentioned QUIC implementations to use a variant of OpenSSL. If you have a pull request that changes the TLS protocol, or adds assembly support for a new CPU, or otherwise is not specific to enabling QUIC, please contribute that to OpenSSL. This fork is intended to be a clean extension to OpenSSL, with the deltas being specific to QUIC.

-

Who are you?

-

This is a collaborative effort between Akamai and Microsoft. We welcome anyone to contribute!

+

What This Is

+ +

This is a fork of the OpenSSL library. It started as a + project to only enable QUIC, but as time went on, we believe + OpenSSL strayed further from what their bulk of their community + wants. As such, this has evolved into a a full-fledged fork of + OpenSSL. We are already closely collaborating with the other two + major forks, BoringSSL and Libre, and our longer-range plan is to + turn this over into a viable Apache Software Foundation + project.

+ +

This project enables QUIC, it does not + implement it. The API's were first developed by Google + and are now in widespread use, including Microsoft's MsQuic, Google's + + Chromium QUIC, and others.

+ +

You can find a more minimal set of patches -- just providing + the QUIC API -- at our OpenSSL repository. + That covers their 1.1 release and the 3.0 stream up through 3.2. + The software here is based on the OpenSSL 3.3 release.

+ +

On to the questions and answers.

+ +

What about branches?

+ +

We don't want to conflict with OpenSSL branch names. Our + previous plan was to append +quic to upstream tag + names to create our branches. Now that we are indpendant of + OpenSSL we will need to think about this.

+ +

How are you keeping current with OpenSSL?

+ +

We will cherry-pick security and other important fixes from + OpenSSL mainline as they appear. If you see a particular PR of + theirs that is important to you, please open an + issue.

+ +

What about library names?

+ +

Library names will be the same, but might use a different + version number eventually. The version numbers for the current + OpenSSL libraries are 3 (for the 3.0 branch). We + will be prefixing 81 (ASCII for 'Q') to the version numbers to + generate a unique version number.

For example: + + + +

The SONAME of these libraries are all different, guaranteeing + the correct library will be used.

+ +

...and the executable?

+ +

We currently do not have any plans to change the name, for + compatibility.

+ +

The openssl version command will report that it + is +quic enabled.

+ +

...and FIPS?

+ +

We are not doing anything with FIPS. This is actually good + news: you should be able to load the OpenSSL 3 FIPS module into + an application built against this fork and everything should Just + Work.

+ +

How can I contribute?

+ +

We want any code here to be acceptable to OpenSSL. For now, + our PR requires a checkbox saying you are authorizing + the contribution under the terms of the ASF license. You might + want to think about signing the appropriate OpenSSL contributor license + agreements. + We want this code to be usable by any and all forks, should they + desire.

+ +

Who are you?

+ +

This is a collaborative effort between Akamai and Microsoft. We welcome anyone to + contribute!

To learn more about HTML Tidy see + http://tidy.sourceforge.net Please send bug reports to + html-tidy@w3.org HTML and CSS specifications are available from + http://www.w3.org/ Lobby your company to join W3C, see + http://www.w3.org/Consortium + +To learn more about HTML Tidy see http://tidy.sourceforge.net +Please send bug reports to html-tidy@w3.org +HTML and CSS specifications are available from http://www.w3.org/ +Lobby your company to join W3C, see http://www.w3.org/Consortium