> Am 24.11.2021 um 10:57 schrieb Joe Orton <jor...@redhat.com>:
> 
> Possibly no strong opinions?  +1 from me anyway.
> 
> How hard is it going to be to test in Travis?

I have a test suite that can be added to our test/modules. Then
we need to bring the rust tool chain into the test image and
checkout/create the librustls.

I can start a docker image to see what that needs.

Kind Regards,
Stefan

> 
> On Wed, Nov 24, 2021 at 10:46:03AM +0100, ste...@eissing.org wrote:
>> Coming back to this. Since there was no feedback on my post: are people
>> just too occupied/opposed/not interested?
>> 
>> Curious,
>> Stefan
>> 
>>> Am 18.11.2021 um 18:48 schrieb ste...@eissing.org:
>>> 
>>> How would you feel about adding mod_tls 
>>> (https://github.com/abetterinternet/mod_tls) as an experimental module to 
>>> Apache httpd?
>>> 
>>> For people who have not followed that development:
>>> - it is a TLS 1.2/1.3 implementation based on rustls, 
>>> https://github.com/rustls/rustls
>>> - the C API is rustls-ffi, found at https://github.com/rustls/rustls-ffi
>>> - it is itself written in C, linking all the Rust things from the 
>>> rustls-ffi library
>>> - it does not bring any Rust into our code base
>>> - functionality wise, it is a clear subset of what mod_ssl offers via 
>>> openssl
>>> (e.g. no client certificates now and not as tweakable - at least for now)
>>> - it can be co-loaded and co-used with mod_ssl on different ports or 
>>> front-/backend roles
>>> - performance-wise, according to my plain vanilla tests, it is on par with 
>>> mod_ssl
>>> 
>>> The decision to offer it downstream is of course then made by the distros, 
>>> as usual with experimental modules. And if and how it is then used rests 
>>> with the users. It is an offered alternative for people.
>>> 
>>> What would be the benefit to the project?
>>> - we offer people an alternative. If they feel the memory safety that Rust 
>>> offers is important to them, they can do it with Apache httpd for the TLS 
>>> stack.
>>> - we could see how people react to this and adapt our TLS offering 
>>> accordingly. It being experimental, we remain free to change it. Or remove 
>>> it again.
>>> 
>>> Organizational Things:
>>> - the development was done by myself
>>> - the work was sponsored by the ISRG (https://www.abetterinternet.org), the 
>>> org behind Let's Encrypt, as part of they "memory safety" initiative 
>>> (https://www.memorysafety.org)
>>> 
>>> 
>>> Feedback appreciated,
>>> 
>>> Stefan
>>> 
>>> PS. On a more personal note:
>>> The way this project turned out was a clean separation between C and Rust. 
>>> The API offered by rustls-ffi is colored by Rust's immutability/borrowed 
>>> memory concepts, but there is nothing Rust special the C code needs to do. 
>>> It remains C code. It remains in our core competence.
>>> 
>>> Working with the rustls people has been nice and productive. The only thing 
>>> I can report is that they come from the client TLS side and specific server 
>>> needs require some explaining. There are things we can offer to them here.
>>> 
>>> There are a lot of political things going on right now around OpenSSL and I 
>>> definitely want to stay out of that. Again, we can offer this without 
>>> having to switch ourself. Even better, customers can use this without 
>>> needing to switch completely, as it co-exists. I think that fits into the 
>>> concepts our server is designed with.
>>> 
>>> Thanks for your time.
>>> 
>> 
> 

Reply via email to