[Bug 206134] [NEW PORT] security/stud: The Scalable TLS Unwrapping Daemon
bugzilla-noreply at freebsd.org
bugzilla-noreply at freebsd.org
Mon Jan 11 15:37:31 UTC 2016
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=206134
Bug ID: 206134
Summary: [NEW PORT] security/stud: The Scalable TLS Unwrapping
Daemon
Product: Ports & Packages
Version: Latest
Hardware: Any
OS: Any
Status: New
Severity: Affects Only Me
Priority: ---
Component: Individual Port(s)
Assignee: freebsd-ports-bugs at FreeBSD.org
Reporter: franz at bett.ag
Created attachment 165397
--> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=165397&action=edit
shar file of stud port
stud is a network proxy that terminates TLS/SSL connections
and forwards the unencrypted traffic to some backend. It's
designed to handle 10s of thousands of connections
efficiently on multicore machines.
--
Initially this software was developed by http://bu.mp at
https://github.com/bumptech/stud, but apparently when the company closed/sold,
they stopped maintaining it. Since there were a lot of pull-requests for
improvements, i took it upon myself to merge the most useful ones and have them
tested.
With the new patches we score an A-rating with SSLlabs on HTTP (A+ requires
HSTS header) while having it NOT crash under heavy load.
What is heavy load?
- When haproxy gets constantly killed with SIGBUS
- When stunnel constantly segfaults
Portlint seems happy, tested with poudriere on 10.2/9.3 w/ x86/amd64 each.
--
You are receiving this mail because:
You are the assignee for the bug.
More information about the freebsd-ports-bugs
mailing list