-
-
Notifications
You must be signed in to change notification settings - Fork 6.8k
TLS: remove support for Secure Transport and BearSSL #16677
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
66c232f
to
ca44be0
Compare
5000 lines removed. Nice. |
Follow-up to 8adee88 curl#16862 Follow-up to 8b1b5cd curl#16660 Ref: curl#16677
These libraries do not support TLS 1.3 and have been marked for removal for over a year. We want to help users select a TLS dependency that is future-proof and reliable, and not supporting TLS 1.3 in 2025 does not infer confidence. Users who build libcurl are likely to be served better and get something more future-proof with a TLS library that supports 1.3. Closes #16677
8e8bea3
to
1951498
Compare
These libraries do not support TLS 1.3 and have been marked for removal for over a year. We want to help users select a TLS dependency that is future-proof and reliable, and not supporting TLS 1.3 in 2025 does not infer confidence. Users who build libcurl are likely to be served better and get something more future-proof with a TLS library that supports 1.3. Closes #16677
1951498
to
d8d3974
Compare
What is the recommended library for Apple platforms? LibreSSL? |
The situation among OpenSSL and its forks is a little chaotic. There does not seem to be a single given winner but depends on what you need and prefer. Clearly Apple themselves like LibreSSL as that is what they use for curl shipped with macOS. |
These libraries do not support TLS 1.3 and have been marked for removal for over a year. We want to help users select a TLS dependency that is future-proof and reliable, and not supporting TLS 1.3 in 2025 does not infer confidence. Users who build libcurl are likely to be served better and get something more future-proof with a TLS library that supports 1.3. Closes #16677
d8d3974
to
068f2c2
Compare
Makes sense. FWIW it is possible to use |
As the guy that originally wrote the Secure Transport back-end, it had a good run, and I understand why it’s about time for it to go. I wish it would have worked out differently, but Apple must have had their reasons to stop working on it, and there’s nothing I can do about that. 🫡 |
In case anyone is wondering, it is possible for libcurl to use Network.framework for TLS while still using BSD sockets internally. However, that’s out of scope for this PR and a non-trivial task. |
These libraries do not support TLS 1.3 and have been marked for removal for over a year. We want to help users select a TLS dependency that is future-proof and reliable, and not supporting TLS 1.3 in 2025 does not infer confidence. Users who build libcurl are likely to be served better and get something more future-proof with a TLS library that supports 1.3. Closes #16677
068f2c2
to
d3df1dc
Compare
These libraries do not support TLS 1.3 and have been marked for removal for over a year. We want to help users select a TLS dependency that is future-proof and reliable, and not supporting TLS 1.3 in 2025 does not infer confidence. Users who build libcurl are likely to be served better and get something more future-proof with a TLS library that supports 1.3. Closes #16677
d3df1dc
to
62c448e
Compare
These libraries do not support TLS 1.3 and have been marked for removal for over a year. We want to help users select a TLS dependency that is future-proof and reliable, and not supporting TLS 1.3 in 2025 does not infer confidence. Users who build libcurl are likely to be served better and get something more future-proof with a TLS library that supports 1.3. Closes #16677
62c448e
to
3d19c95
Compare
These libraries do not support TLS 1.3 and have been marked for removal for over a year. We want to help users select a TLS dependency that is future-proof and reliable, and not supporting TLS 1.3 in 2025 does not infer confidence. Users who build libcurl are likely to be served better and get something more future-proof with a TLS library that supports 1.3. Closes #16677
3d19c95
to
7276ffd
Compare
These libraries do not support TLS 1.3 and have been marked for removal for over a year. We want to help users select a TLS dependency that is future-proof and reliable, and not supporting TLS 1.3 in 2025 does not infer confidence. Users who build libcurl are likely to be served better and get something more future-proof with a TLS library that supports 1.3. Closes #16677
7276ffd
to
637c43d
Compare
This comment was marked as outdated.
This comment was marked as outdated.
These libraries do not support TLS 1.3 and have been marked for removal for over a year. We want to help users select a TLS dependency that is future-proof and reliable, and not supporting TLS 1.3 in 2025 does not infer confidence. Users who build libcurl are likely to be served better and get something more future-proof with a TLS library that supports 1.3. Closes #16677
6c24bc1
to
baf4cb1
Compare
Due to get merged after 8.14.1 has shipped. |
These libraries do not support TLS 1.3 and have been marked for removal for over a year. We want to help users select a TLS dependency that is future-proof and reliable, and not supporting TLS 1.3 in 2025 does not infer confidence. Users who build libcurl are likely to be served better and get something more future-proof with a TLS library that supports 1.3. Closes #16677
baf4cb1
to
0060f16
Compare
These libraries do not support TLS 1.3 and have been marked for removal for over a year. We want to help users select a TLS dependency that is future-proof and reliable, and not supporting TLS 1.3 in 2025 does not infer confidence. Users who build libcurl are likely to be served better and get something more future-proof with a TLS library that supports 1.3. Closes curl#16677
Follow-up to 08a3e8e curl#16677 Closes curl#17582
`CURLOPT_SSL_FALSESTART` / `--false-start`, Secure Transport, BearSSL, GSKit, MesaLink, NSS. Follow-up to 1e2e808 curl#17595 Follow-up to 08a3e8e curl#16677 Closes curl#17605
These libraries do not support TLS 1.3 and have been marked for removal for over a year. We want to help users select a TLS dependency that is future-proof and reliable, and not supporting TLS 1.3 in 2025 does not infer confidence. Users who build libcurl are likely to be served better and get something more future-proof with a TLS library that supports 1.3.
Targeted for merge after May 2025.