{"id":24195,"date":"2014-06-21T16:44:38","date_gmt":"2014-06-21T20:44:38","guid":{"rendered":"http:\/\/www.opensource.im\/?p=24195"},"modified":"2014-06-21T16:44:38","modified_gmt":"2014-06-21T20:44:38","slug":"google-unveils-independent-fork-of-openssl-called-boringssl","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/google-unveils-independent-fork-of-openssl-called-boringssl.php","title":{"rendered":"Google unveils independent \u201cfork\u201d of OpenSSL called \u201cBoringSSL\u201d"},"content":{"rendered":"<p><p>    Google is releasing its own independently developed \"fork\" of    OpenSSL, the widely used cryptography library that came to    international attention following the Heartbleed vulnerability    that threatened hundreds of thousands of websites with    catastrophic attacks.  <\/p>\n<p>    OpenBSD developers \"removed half of the OpenSSL source tree in    a week.\"  <\/p>\n<p>    \"But well also be more able to import changes from LibreSSL    and they are welcome to take changes from us,\" Adam Langley, a    widely respected cryptography engineer and Google employee,    wrote in a blog post    introducing BoringSSL. \"We have already relicensed some of    our prior contributions to OpenSSL under an ISC license at    their request and completely new code that we write will also    be so licensed.\"  <\/p>\n<p>    While it wasn't immediately clear how the forks will    functionor when it makes sense to use one over anotherthe    following exchange from this Hackernews    forum may provide some clues.  <\/p>\n<p>      matteotom      So from what I understand, Google has a bunch of OpenSSL      patches they use. They used to re-apply those patches to each      new OpenSSL release, but now they're going to keep their own      branch (BoringSSL) and pull and merge changes from OpenSSL?    <\/p>\n<p>      What are the costs\/benifits of one method over the other?    <\/p>\n<p>      agl      I think the costs and benefits are pretty much what you would      expect. If your diff from upstream is small, then the      tradeoff strongly favours rebasing against upstream and      tracking it.    <\/p>\n<p>      However, as the diff becomes larger, the tradeoff shifts. I      think we passed that point a while back but, since we were      going to switch models anyway, I took some time to clean up      some bits of the code too.    <\/p>\n<p>      tedunangst      Fewer surprises. You don't wake up one day and discover that      TLS heartbeats have appeared in your library as a result of      previous upgrades. Every upstream change has to be reviewed      because that's the only way it gets in. Also, local changes      are much less likely to be lost as a result of merge      conflicts.    <\/p>\n<p>      The downside is that you may miss some upstream changes that      you do care about.    <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Go here to see the original:<br \/>\n<a target=\"_blank\" href=\"http:\/\/arstechnica.com\/security\/2014\/06\/google-unveils-independent-fork-of-openssl-called-boringssl\" title=\"Google unveils independent \u201cfork\u201d of OpenSSL called \u201cBoringSSL\u201d\">Google unveils independent \u201cfork\u201d of OpenSSL called \u201cBoringSSL\u201d<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Google is releasing its own independently developed \"fork\" of OpenSSL, the widely used cryptography library that came to international attention following the Heartbleed vulnerability that threatened hundreds of thousands of websites with catastrophic attacks. OpenBSD developers \"removed half of the OpenSSL source tree in a week.\" \"But well also be more able to import changes from LibreSSL and they are welcome to take changes from us,\" Adam Langley, a widely respected cryptography engineer and Google employee, wrote in a blog post introducing BoringSSL. \"We have already relicensed some of our prior contributions to OpenSSL under an ISC license at their request and completely new code that we write will also be so licensed.\" While it wasn't immediately clear how the forks will functionor when it makes sense to use one over anotherthe following exchange from this Hackernews forum may provide some clues<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-24195","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/24195"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=24195"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/24195\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=24195"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=24195"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=24195"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}