frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Open in hackernews

WolfSSL Sucks Too, So Now What?

https://blog.feld.me/posts/2026/02/wolfssl-sucks-too/
43•thomasjb•2h ago

Comments

ospray•2h ago
We need something with TLS in the name for the next one so people stop getting confused.
magicalhippo•1h ago
MbedTLS[1] got your back!

[1]: https://www.trustedfirmware.org/projects/mbed-tls/

weinzierl•1h ago
rustls is there. It has TLS in the name, it is good and there is a C FFI wrapper.
gspr•1h ago
Rustls still outsources cryptographic primitives. I believe the currently supported providers of those are… drumroll… AWS-LC and Ring. The latter is a fork of BoringSSL. The article describes AWS-LC and BoringSSL as "Googled and Amazoned to death; they don't care about anyone but their own use cases".

The state of things sucks :-(

koakuma-chan•1h ago
there is https://github.com/RustCrypto/rustls-rustcrypto fwiw
koakuma-chan•1h ago
rustls doesn't have its own implementation of cryptography, you have to choose a provider like openssl or aws lc
dwedge•1h ago
A c wrapper to rust feels like we've gone full circle
zephen•1h ago
You're obviously looking for lastLs.
MrBuddyCasino•1h ago
Now what? BearSSL.
mythz•1h ago
BearSSL by Thomas Pornin is always worth checking in on, not sure what the current status is but looks like it received a commit last year.

[1] https://bearssl.org

jorams•1h ago
BearSSL is really cool, but it claims beta quality with the latest release in 2018, doesn't support TLS 1.3, and hasn't seen meaningful development in years. It's averaging about 1 commit per year recently, and they're not big ones.
eptcyka•1h ago
There’s always rustls.
LtWorf•1h ago
FIPS compliant?
eptcyka•46m ago
It is if you use the FIPS compliance feature - then you also depend on aws-lc, but only for the crypto primitives.
gspr•1h ago
Rustls still outsources cryptographic primitives. I believe the currently supported providers of those are… drumroll… AWS-LC and Ring. The latter is a fork of BoringSSL. The article describes AWS-LC and BoringSSL as "Googled and Amazoned to death; they don't care about anyone but their own use cases".

The state of things sucks :-(

saqrais•1h ago
NanoSSL by DigiCert https://dev.digicert.com/trustcore-sdk/nanossl.html

It's opensource -> https://github.com/digicert/trustcore

meinersbur•1h ago
This is the WolfSSL maintainer's response[1]

> This ticket is rather long and has a lot of irrelevant content regarding this new topic. If I need to bring in a colleague I do not want them to have to wade through all the irrelevant context. If you would like, please open a new issue with regards to how we support middlebox compatibility.

The author turns this into:

> The GitHub issue comment left at the end leads me to believe that they aren't really interested in RFC compliance. There isn't a middleground here or a "different way" of implementing middlebox compatibility. It's either RFC compliant or not. And they're not.

This is a bad-faith interpretation of the maintainer's response. They only asked to open a new, more specific issue report. The maintainer always answered within minutes, which I find quite impressive (even after the author ghosted for months). The author consumed the maintainer's time and shouldn't get the blame for the author's problems.

[1]: https://github.com/wolfSSL/wolfssl/issues/9156

reanimus•1h ago
I don't know, I don't think it's really a huge waste of time considering I just read the entire comment thread in a handful of minutes. And beyond that, failing to comply with RFC requirements is the bug here -- a workaround existing for a specific language isn't a fix.
deng•1h ago
Again: the maintainer does not say there is no bug. He says: please open a new issue, with a proper title and description for the actual underlying problem. Is that seriously too much to ask? Instead, the guy writes a whole blog post shitting on the project. Does anyone still wonder why people burn out on maintaining FOSS projects?
halapro•1h ago
Not great behavior I agree, but what else is there to say other than "it does not match the spec at point 1.2.3"?
Semaphor•53m ago
Then opening the ticket should be easy enough?

I certainly understand the maintainer here, because that’s what I keep telling colleagues at work.

Tickets get really cumbersome if they are not clear and actionable.

hypeatei•59m ago
The maintainer should just open a new issue for RFC compliance himself since that's a pretty big issue and he obviously thinks OP spams too much.

This game of stalling / obfuscating via the issue tracker gets very old.

deng•51m ago
> The maintainer should just

Out of interest: which FOSS projects are you maintaining, and how many users do these have, approximately?

hypeatei•32m ago
Out of interest, how is that relevant? Are we not able to criticize a FOSS maintainers response unless we run a project of scale ourselves? The maintainer is clearly engaging and knows what the problem is but stalls on the "last mile" which is issue creation. Do you agree?

wolfSSL also sells commercial licenses so it's not like they're going uncompensated for their work. Regardless, we shouldn't put people on pedestals because their title is "FOSS maintainer"

deng•22m ago
> Out of interest, how is that relevant?

OK, so: zero. It is relevant because if you did, you probably wouldn't feel so entitled.

> The maintainer is clearly engaging and knows what the problem is but stalls on the "last mile" which is issue creation. Do you agree?

No, I don't agree. This is just your interpretation, done in bad faith.

> wolfSSL also sells commercial licenses so it's not like they're going uncompensated for their work.

The user in question does not have a commercial license, so in this case, the maintainer was not compensated for assisting that user.

> Regardless, we shouldn't put people on pedestals because their title is "FOSS maintainer"

We shouldn't shit on other people's work we got for free just because they asked for a tiny little thing we might do to help them. It's you who needs to get down from that pedestal.

hypeatei•7m ago
> you probably wouldn't feel so entitled.

...what? Are we living in the same universe? What exactly did I say that makes me entitled?

> The user in question does not have a commercial license

Do you know that for sure or are you speculating?

> We shouldn't shit on other people's work we got for free

When did I shit on the work of wolfSSL? I'm saying that it appears they were engaging but got hung up on a small issue.

> It's you who needs to get down from that pedestal.

Respectfully, you need to get a grip.

Phemist•57m ago
This issue has a similar conversational rhythm that led to the AI agent hit piece that was trending yesterday:

https://theshamblog.com/an-ai-agent-published-a-hit-piece-on...

The OPs blog post also reeks of a similar style to the hit piece.

Given the large delay between the initial report and further responses by the user `feld`, I wonder if an OpenClaw agent was given free reign to try to clear up outstanding issues in some project, including handling the communication with the project maintainers?

Maybe I am getting too paranoid..

teekert•25m ago
A reasonable reply indeed from the maintainer, this happens a lot where you think together in an issue and identify whats really wrong near the end. Only then is one able to articulate an issue in a helpful, concise way. Perhaps GH could add a feature to facilitate this pattern.
dieulot•1h ago
Regarding HAProxy, they ended up using AWS-LC in their new Debian/Ubuntu “performance” packages: https://www.haproxy.com/blog/fresh-from-aws-reinvent-superch...
stabbles•1h ago
Many people and projects have tried to ditch OpenSSL in favor of LibreSSL, WolfSSL, MbedTLS, etc, but by now many have returned to OpenSSL. The IQ curve meme with "just use OpenSSL" applies.
germandiago•1h ago
Usability-wise (I do not need many features or compliance for FIPS) I have been happy with Botan: https://botan.randombit.net/

MinIO repository is no longer maintained

https://github.com/minio/minio/commit/7aac2a2c5b7c882e68c1ce017d8256be2feea27f
255•psvmcc•5h ago•150 comments

Resizing windows on macOS Tahoe – the saga continues

https://noheger.at/blog/2026/02/12/resizing-windows-on-macos-tahoe-the-saga-continues/
621•erickhill•12h ago•275 comments

MMAcevedo aka Lena by qntm

https://qntm.org/mmacevedo
125•stickynotememo•7h ago•60 comments

GPT‑5.3‑Codex‑Spark

https://openai.com/index/introducing-gpt-5-3-codex-spark/
766•meetpateltech•18h ago•329 comments

Gemini 3 Deep Think

https://blog.google/innovation-and-ai/models-and-research/gemini-models/gemini-3-deep-think/
899•tosh•19h ago•587 comments

Tell HN: Ralph Giles has died (Xiph.org| Rust@Mozilla | Ghostscript)

301•ffworld•13h ago•16 comments

Gauntlet AI (YC S17) train you to master building with AI, give you $200k+ job

http://qualify.gauntletAI.com
1•austenallred•17m ago

We interfaced single-threaded C++ with multi-threaded Rust

https://antithesis.com/blog/2026/rust_cpp/
47•lukastyrychtr•5d ago•2 comments

An AI agent published a hit piece on me

https://theshamblog.com/an-ai-agent-published-a-hit-piece-on-me/
1926•scottshambaugh•20h ago•765 comments

Cache Monet

https://cachemonet.com
12•keepamovin•5d ago•7 comments

Particle Lenia

https://znah.net/lenia/
19•memalign•4d ago•0 comments

Advanced Aerial Robotics Made Simple

https://www.drehmflight.com
17•jacquesm•4d ago•1 comments

US repeals EPA endangerment finding for greenhouse gases

https://www.cnn.com/2026/02/12/climate/trump-repeals-epa-endangerment-finding
54•heresie-dabord•32m ago•28 comments

AWS Adds support for nested virtualization

https://github.com/aws/aws-sdk-go-v2/commit/3dca5e45d5ad05460b93410087833cbaa624754e
218•sitole•12h ago•79 comments

Polis: Open-source platform for large-scale civic deliberation

https://pol.is/home2
274•mefengl•18h ago•103 comments

Ring owners are returning their cameras

https://www.msn.com/en-us/lifestyle/shopping/ring-owners-are-returning-their-cameras-here-s-how-m...
213•c420•6h ago•141 comments

Improving 15 LLMs at Coding in One Afternoon. Only the Harness Changed

http://blog.can.ac/2026/02/12/the-harness-problem/
706•kachapopopow•23h ago•260 comments

Ruby Newbie Is Joining the Ruby Users Forum

https://www.rubyforum.org/tag/getting-started
35•jvrc•3d ago•4 comments

My Grandma Was a Fed – Lessons from Digitizing Hours of Childhood

https://sampatt.com/blog/2025-12-13-my-grandma-was-a-fed-lessons-from-digitizing-hundreds-of-hour...
148•SamPatt•4d ago•43 comments

Beginning fully autonomous operations with the 6th-generation Waymo driver

https://waymo.com/blog/2026/02/ro-on-6th-gen-waymo-driver
224•ra7•20h ago•259 comments

Skip the Tips: A game to select "No Tip" but dark patterns try to stop you

https://skipthe.tips/
368•randycupertino•11h ago•293 comments

Major European payment processor can't send email to Google Workspace users

https://atha.io/blog/2026-02-12-viva
547•thatha7777•22h ago•378 comments

Ring cancels its partnership with Flock Safety after surveillance backlash

https://www.theverge.com/news/878447/ring-flock-partnership-canceled
447•c420•12h ago•233 comments

Japan's Dododo Land, the most irritating place on Earth

https://soranews24.com/2026/02/07/take-a-trip-to-japans-dododo-land-the-most-irritating-place-on-...
84•zdw•5d ago•27 comments

Apache Arrow is 10 years old

https://arrow.apache.org/blog/2026/02/12/arrow-anniversary/
233•tosh•23h ago•66 comments

Launch HN: Omnara (YC S25) – Run Claude Code and Codex from anywhere

123•kmansm27•19h ago•139 comments

Recoverable and Irrecoverable Decisions

https://herbertlui.net/recoverable-and-irrecoverable-decisions/
72•herbertl•13h ago•24 comments

Evaluating Multilingual, Context-Aware Guardrails: A Humanitarian LLM Use Case

https://blog.mozilla.ai/evaluating-multilingual-context-aware-guardrails-evidence-from-a-humanita...
26•benbreen•14h ago•0 comments

How to Have a Bad Career – David Patterson (2016) [video]

https://www.youtube.com/watch?v=Rn1w4MRHIhc
93•rombr•17h ago•24 comments

The "Crown of Nobles" Noble Gas Tube Display (2024)

https://theshamblog.com/the-crown-of-nobles-noble-gas-tube-display/
140•Ivoah•1d ago•32 comments