Date: Mon, 11 Jan 2016 15:37:31 +0000 From: bugzilla-noreply@freebsd.org To: freebsd-ports-bugs@FreeBSD.org Subject: [Bug 206134] [NEW PORT] security/stud: The Scalable TLS Unwrapping Daemon Message-ID: <bug-206134-13@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D206134 Bug ID: 206134 Summary: [NEW PORT] security/stud: The Scalable TLS Unwrapping Daemon Product: Ports & Packages Version: Latest Hardware: Any OS: Any Status: New Severity: Affects Only Me Priority: --- Component: Individual Port(s) Assignee: freebsd-ports-bugs@FreeBSD.org Reporter: franz@bett.ag Created attachment 165397 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D165397&action= =3Dedit shar file of stud port stud is a network proxy that terminates TLS/SSL connections and forwards the unencrypted traffic to some backend. It's designed to handle 10s of thousands of connections efficiently on multicore machines. --=20 Initially this software was developed by http://bu.mp at https://github.com/bumptech/stud, but apparently when the company closed/so= ld, they stopped maintaining it. Since there were a lot of pull-requests for improvements, i took it upon myself to merge the most useful ones and have = them tested. With the new patches we score an A-rating with SSLlabs on HTTP (A+ requires HSTS header) while having it NOT crash under heavy load. What is heavy load? - When haproxy gets constantly killed with SIGBUS - When stunnel constantly segfaults Portlint seems happy, tested with poudriere on 10.2/9.3 w/ x86/amd64 each. --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-206134-13>