Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 11 Jan 2016 15:37:31 +0000
From:      bugzilla-noreply@freebsd.org
To:        freebsd-ports-bugs@FreeBSD.org
Subject:   [Bug 206134] [NEW PORT] security/stud: The Scalable TLS Unwrapping Daemon
Message-ID:  <bug-206134-13@https.bugs.freebsd.org/bugzilla/>

next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D206134

            Bug ID: 206134
           Summary: [NEW PORT] security/stud: The Scalable TLS Unwrapping
                    Daemon
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
                OS: Any
            Status: New
          Severity: Affects Only Me
          Priority: ---
         Component: Individual Port(s)
          Assignee: freebsd-ports-bugs@FreeBSD.org
          Reporter: franz@bett.ag

Created attachment 165397
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D165397&action=
=3Dedit
shar file of stud port

stud is a network proxy that terminates TLS/SSL connections
and forwards the unencrypted traffic to some backend. It's
designed to handle 10s of thousands of connections
efficiently on multicore machines.

--=20

Initially this software was developed by http://bu.mp at
https://github.com/bumptech/stud, but apparently when the company closed/so=
ld,
they stopped maintaining it. Since there were a lot of pull-requests for
improvements, i took it upon myself to merge the most useful ones and have =
them
tested.

With the new patches we score an A-rating with SSLlabs on HTTP (A+ requires
HSTS header) while having it NOT crash under heavy load.

What is heavy load?
- When haproxy gets constantly killed with SIGBUS
- When stunnel constantly segfaults

Portlint seems happy, tested with poudriere on 10.2/9.3 w/ x86/amd64 each.

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-206134-13>