-
Notifications
You must be signed in to change notification settings - Fork 5.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Deno shouldn't use OpenSSL #2122
Comments
More context to consider:
(quiche and quinn are QUIC implementations considered in #1558) (hyper-rustls was used in PR #1147 referenced in denoland/std#153) There are pros and cons for using each of those. The question is, should |
More TLS alternative: mbed TLS (formerly known as PolarSSL) makes it trivially easy for developers to include cryptographic and SSL/TLS capabilities in their (embedded) products, facilitating this functionality with a minimal coding footprint. |
We are already using rustls and ring (outgoing fetch requests can do TLS - this is not yet exposed elsewhere). AFAIK we don't depend on OpenSSL (besides the bits that are forked from OpenSSL inside Ring). |
(Update: Looking at more issues and source code I see that probably only the build process requires OpenSSL, not Deno itself, but still there is some discussion of using other libs that themselves use at least two different TLS libraries so I leave the info below for consideration.)
Looking at #1787 it seems that the consensus is to use OpenSSL in Deno. I think it should be reconsidered for a project that takes security so seriously as Deno, for the following reasons:
There was a discussion in nodejs/node#428 about 3 years ago, main points to consider:
What we could do:
I think this is something to be seriously considered looking at the experience of Node.
One of the main features of Deno is security. It would be a pity if Deno wouldn't be able to run without problems on the operating systems that take security most seriously.
The text was updated successfully, but these errors were encountered: