[Privoxy-devel] WolfSSL support ready for testing

Fabian Keil fk at fabiankeil.de
Sat Mar 9 13:27:20 CET 2024


User Git <git at git.privoxy.org> wrote on 2024-03-09 at 12:10:21:

> git pushed a commit to branch master
> in repository privoxy.
> 
> commit eee84548c26f5d5efcb19a3a2c3c949a01de45c2
> Author: Fabian Keil <fk at fabiankeil.de>
> AuthorDate: Tue Jan 12 08:12:38 2021 +0100
> 
>     Allow to use wolfSSL for https inspection
>     
>     It's licensed under GPlv2 or later and unlike mbedTLS
>     there don't seem to be plans to change the license.
>     
>     As a bonus, wolfSSL supports TLS 1.3 and can be significantly
>     faster than mbedTLS. Mainly tested on ElectroBSD amd64 where
>     it can compete with OpenSSL and LibreSSL:
>     https://www.fabiankeil.de/gehacktes/privoxy-tls-benchmarks/
>     
>     To enable the support, install wolfSSL and run ./configure
>     with the --with-wolfssl option.
>     
>     Privoxy users and packagers that currently build Privoxy
>     binaries with mbedTLS may want to consider using wolfSSL
>     in the future once it has been properly tested.
>     
>     Sponsored by: Privoxy project funds collected at SPI

As you can see above I finally pushed the WolfSSL [0] support
to the master branch.

One issue I noticed while testing is that some websites
including ours [1] can't be loaded anymore on my ElectroBSD
system using the current WolfSSL 5.6.3:

12:17:20.862 048 Error: X509 certificate verification for www.privoxy.org failed with error -313: received alert fatal error

This used to work in 2021 when I wrote the code and
I'm optimistic that this issue can be resolved by
compiling WolfSSL differently.

At the moment I'm configuring WolfSSL like this:

CONFIGURE_ARGS=	--disable-dependency-tracking \
		--enable-certgen \
		--enable-des3 \
		--disable-des3-ciphers \
		--enable-dh \
		--enable-dsa \
		--enable-dtls \
		--enable-ecc \
		--enable-fastmath \
		--enable-fasthugemath \
		--enable-ipv6 \
		--enable-keygen \
		--enable-opensslall \
		--enable-opensslextra \
		--enable-renegotiation-indication \
		--enable-ripemd \
		--enable-sessioncerts \
		--enable-session-ticket \
		--enable-sp \
		--enable-sp-asm \
		--enable-sp-math-all \
		--enable-sha512 \
		--enable-shared \
		--enable-sni \
		--enable-ssh \
		--enable-static \
		--enable-tls13 \
		--enable-tls13-draft18

I'll look into this.

In the meantime I'd be interested to know how WolfSSL
works on other platforms.

I've compiled WolfSSL with a patch [2] to prevent a bad rating at [3].

Fabian

[0] <https://www.wolfssl.com/>
[1] <https://www.privoxy.org/>
[2] <https://github.com/wolfSSL/wolfssl/pull/7315>
[3] <https://www.howsmyssl.com/>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.privoxy.org/pipermail/privoxy-devel/attachments/20240309/2b849677/attachment.bin>


More information about the Privoxy-devel mailing list