[Bug 206134] [NEW PORT] security/stud: The Scalable TLS Unwrapping Daemon

bugzilla-noreply at freebsd.org bugzilla-noreply at freebsd.org
Mon Jan 11 15:37:31 UTC 2016


https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=206134

            Bug ID: 206134
           Summary: [NEW PORT] security/stud: The Scalable TLS Unwrapping
                    Daemon
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
                OS: Any
            Status: New
          Severity: Affects Only Me
          Priority: ---
         Component: Individual Port(s)
          Assignee: freebsd-ports-bugs at FreeBSD.org
          Reporter: franz at bett.ag

Created attachment 165397
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=165397&action=edit
shar file of stud port

stud is a network proxy that terminates TLS/SSL connections
and forwards the unencrypted traffic to some backend. It's
designed to handle 10s of thousands of connections
efficiently on multicore machines.

-- 

Initially this software was developed by http://bu.mp at
https://github.com/bumptech/stud, but apparently when the company closed/sold,
they stopped maintaining it. Since there were a lot of pull-requests for
improvements, i took it upon myself to merge the most useful ones and have them
tested.

With the new patches we score an A-rating with SSLlabs on HTTP (A+ requires
HSTS header) while having it NOT crash under heavy load.

What is heavy load?
- When haproxy gets constantly killed with SIGBUS
- When stunnel constantly segfaults

Portlint seems happy, tested with poudriere on 10.2/9.3 w/ x86/amd64 each.

-- 
You are receiving this mail because:
You are the assignee for the bug.


More information about the freebsd-ports-bugs mailing list