Comparison of TLS implementations

From Wikipedia, the free encyclopedia
  (Redirected from Comparison of TLS Implementations)
Jump to: navigation, search

The Transport Layer Security (TLS) protocol provides the ability to secure communications across networks. This comparison of TLS implementations compares several of the most notable libraries. There are several TLS implementations which are free and open source software.

All comparison categories use the stable version of each implementation listed in the overview section. The comparison is limited to features that directly relate to the TLS protocol.

[1]== Overview ==

Implementation Developed By Open Source Software License Copyright Owner Latest Stable Version Release Date Origin
Botan Jack Lloyd Yes Simplified BSD License Jack Lloyd 1.11.5 2013-11-10 US (Vermont)
cryptlib Peter Gutmann Yes Sleepycat License and commercial license Peter Gutmann 3.4.2 2012-12-17 NZ
CyaSSL wolfSSL Yes GPLv2 and commercial license wolfSSL Inc. 2.9.4 2014-04-09 US
GnuTLS GnuTLS project Yes LGPL Free Software Foundation 3.2.13 2014-04-07 EU (Greece and Sweden)
MatrixSSL PeerSec Networks Yes GPLv2 and commercial license PeerSec Networks 3.4.2 2013-02-28 US
Network Security Services Yes Mozilla Public License NSS contributors 3.16 2014-03-18 US
OpenSSL OpenSSL project Yes OpenSSL / SSLeay dual-license Eric Young, Tim Hudson, Sun, OpenSSL project, and others 1.0.1g 2014-04-07 Australia/EU
PolarSSL Offspark Yes GPLv2 and commercial license Brainspark B.V. (brainspark.nl) 1.3.4 2014-01-27 EU (Netherlands)
SChannel Microsoft No Proprietary Microsoft Inc. Windows 8.1 2013-11-13 US
Secure Transport Apple Inc. Yes APSL 2.0 Apple Inc. 55471.14 (OS X 10.9.2) 2014-02-25 US
SharkSSL Realtimelogic LLC No Proprietary and Commercial License Realtimelogic LLC 2.1 2014-01-12 US
JSSE Oracle Yes GPLv2 and commercial license Oracle JDK 8 2014-03-18 (JDK 8) US
Implementation Developed By Open Source Software License Copyright Owner Latest Stable Version Release Date Origin

Protocol support[edit]

Several versions of the TLS protocol exist. SSL 2.0 is a deprecated[2] protocol version with significant weaknesses. SSL 3.0 (1996) and TLS 1.0 (1999) are successors with two weaknesses in CBC-padding that were explained in 2001 by Serge Vaudenay.[3] TLS 1.1 (2006) fixed only one of the problems, by switching to random IVs for CBC block ciphers, whereas the more problematic use of mac-pad-encrypt instead of the secure pad-mac-encrypt was ignored and is still present in TLSv1.2 today. A workaround for SSLv3 and TLSv1.0, roughly equivalent to random IVs from TLSv1.1, was widely adopted by many implementations in late 2011,[4] so from a security perspective, all existing version of TLS v1.0, v1.1 and v1.2 provide equivalent strength in the base protocol and are suitable for 128-bit security according to NIST SP800-57 up to at least 2030. TLSv1.2 (2008) is the latest published version of the base protocol, introducing a means to identify the hash used for digital signatures. While permitting the use of stronger hash functions for digital signatures in the future (rsa,sha256/sha384/sha512) over the SSLv3 conservative choice (rsa,sha1+md5), the TLSv1.2 protocol change inadvertently and substantially weakened the default digital signatures and provides (rsa,sha1) and even (rsa,md5).[5]

Datagram Transport Layer Security (DTLS or Datagram TLS) 1.0 is a modification of TLS 1.1 for a packet-oriented transport layer, where packet loss and packet reordering have to be tolerated. The revision DTLSv1.2 based on TLSv1.2 was published in January 2012[6]

Note that there are known vulnerabilities in SSL 2.0. With the exception of the predictable IVs (for which an easy workaround exists) all currently known vulnerabilities affect SSLv3 and all version of TLSv1.0/v1.1/v1.2 alike.[7]

Implementation SSL 2.0
(Insecure)[8]
SSL 3.0[9] TLS 1.0[10] TLS 1.1[11] TLS 1.2[12] DTLS 1.0[13] DTLS 1.2[6]
Botan No[14] Yes Yes Yes Yes Beta Beta
cryptlib No Yes Yes Yes Yes No No
CyaSSL No Yes Yes Yes Yes Yes Yes
GnuTLS No[14] Yes Yes Yes Yes Yes Yes
MatrixSSL No[14] Yes Yes Yes Yes Yes Yes
NSS Disabled by default Yes Yes Yes[15] Yes[16] Beta[15][17] No[17][18]
OpenSSL Yes Yes Yes Yes[19] Yes[19] Yes Beta[19]
PolarSSL No Yes Yes Yes Yes No No
SChannel XP/2003[20] Disabled by MSIE 7 Yes Enabled by MSIE 7 No No No No
SChannel Vista/2008[21] Disabled by default Yes Yes No No No No
SChannel Win7/2008R2[22] Disabled by default Yes Yes Yes Yes Yes[23] Yes[23]
SChannel Win8/2012 Disabled by default Yes Yes Yes Yes Yes Yes
Secure Transport Not anymore[a] Yes Yes Yes[a] Yes[a] Yes[a] No
JSSE No[14] Yes Yes Yes Yes No No
Implementation SSL 2.0 SSL 3.0 TLS 1.0 TLS 1.1 TLS 1.2 DTLS 1.0 DTLS 1.2
  1. ^ Secure Transport: SSL 2.0 was discontinued in OS X 10.8. TLS 1.1, 1.2 and DTLS are available on iOS 5.0 and later, and OS X 10.8 and later.[24]

NSA Suite B Cryptography[edit]

Required components for NSA Suite B Cryptography (RFC 6460) are:

Per CNSSP-15, the 256-bit elliptic curve (specified in FIPS 186-2), SHA-256, and AES with 128-bit keys are sufficient for protecting classified information up to the Secret level, while the 384-bit elliptic curve (specified in FIPS 186-2), SHA-384, and AES with 256-bit keys are necessary for the protection of Top Secret information.

Implementation TLS 1.2 Suite B [RFC 6460]
Botan Yes
cryptlib Yes
CyaSSL Yes
GnuTLS Yes
NSS No[25]
MatrixSSL Yes
OpenSSL No
PolarSSL Yes
SChannel No
Secure Transport Unknown
SharkSSL Yes
JSSE Yes[26]
Implementation TLS 1.2 Suite B [RFC 6460]

Certifications[edit]

Implementation Certified version FIPS 140-2 Common Criteria
Botan
cryptlib
CyaSSL
GnuTLS
MatrixSSL Level 1
NSS 3.11.4, 3.12.4 Level 2
OpenSSL 1.0, 1.1.1, 1.1.2, 1.2, 1.2.1, 1.2.2, 1.2.3, 1.2.4, 2.0, 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.0.5 Level 1
PolarSSL
SChannel Windows CE, Embedded, XP, Vista, 7, 8, RT, Server 2003, Server 2008 R2, and Server 2012 Level 1
Secure Transport Mac OS X 10.6 Snow Leopard, Mac OS X 10.7 Lion, Mac OS X 10.8 Mountain Lion, OS X 10.9 Mavericks, iOS 6.0, iOS 7.0 Level 1
SharkSSL
JSSE
Implementation Certified version FIPS 140-2 Common Criteria

[27]

Key exchange algorithms (certificate-only)[edit]

This section lists the certificate verification functionality available in the various implementations.

Implementation RSA[12] RSA-EXPORT[12] DHE-RSA[12] DHE-DSS[12] ECDH-ECDSA[28] ECDHE-ECDSA[28] ECDH-RSA[28] ECDHE-RSA[28] VKO GOST R 34.10-2001[29][30]
Botan Yes No Yes Yes No Yes No Yes No
cryptlib Yes No Yes Yes No Yes No No No
CyaSSL Yes No Yes No Yes Yes Yes Yes No
GnuTLS Yes Disabled by default Yes Yes No Yes No Yes No
MatrixSSL Yes No Yes No Yes Yes Yes Yes No
NSS Yes Disabled by default Partial[31][32] Partial[31][32] Yes Yes Yes Yes No
OpenSSL Yes Yes Yes Yes No Yes Yes Yes Yes
PolarSSL Yes No Yes No Yes Yes Yes Yes No
SChannel XP/2003 Yes Yes No max.1024 No No No No 3rd Party
SChannel Vista/2008 Yes disabled by default No max.1024 No Yes No Yes 3rd Party
SChannel 7/2008R2 Yes disabled by default No max.1024 No Yes No Yes 3rd Party
SChannel 8/2012 Yes disabled by default No max.1024 No Yes No Yes 3rd Party
Secure Transport Yes Yes Yes Yes Yes Yes Yes Yes No
JSSE Yes Yes max.2048 max.2048 Yes Yes Yes Yes No[33]
Implementation RSA RSA EXPORT DHE-RSA DHE-DSS ECDH-ECDSA ECDHE-ECDSA ECDH-RSA ECDHE-RSA VKO GOST R 34.10-2001

Certificate verification methods[edit]

Implementation Application-defined PKIX path validation[12] CRL[34] OCSP[35] DANE (DNSSEC)[12] Trust on First Use (TOFU)
Botan Yes Yes Yes Yes No No
cryptlib Yes No No
CyaSSL Yes Yes Yes Yes No No
GnuTLS Yes Yes Yes Yes Yes Yes
MatrixSSL Yes Yes Yes No No No
NSS Yes Yes Yes Yes No No
OpenSSL Yes Yes Yes No No
PolarSSL Yes Yes Yes No No
SChannel Yes Yes[36] Yes[36] No No
Secure Transport Yes Yes Yes Yes No No
JSSE Yes Yes Yes Yes No No
Implementation Application-defined PKIX CRL OCSP DANE TOFU

Key exchange algorithms (alternative key-exchanges)[edit]

Implementation DH-ANON[12] (Insecure) SRP[37] SRP-DSS[37] SRP-RSA[37] PSK-RSA[38] PSK[38] DHE-PSK[38] ECDHE-PSK[39] ECDH-ANON[28] (Insecure)
Botan Yes Yes Yes Yes No Yes Yes Yes Yes
cryptlib No No No No No Yes Yes No No
CyaSSL No No No No No Yes No No No
GnuTLS Yes Yes Yes Yes Yes Yes Yes Yes Yes
MatrixSSL Yes No No No No Yes Yes No No
NSS Yes No[40] No[40] No[40] No[41] No[41] No[41] No[41] Yes
OpenSSL Yes Yes Yes Yes No Yes No No Yes
PolarSSL No No No No Yes Yes Yes Yes No
SChannel No No No No No No No No No
Secure Transport Yes No No No Partial[42] Partial[42] Partial[42] No Yes
JSSE Disabled by default in Java 8 No No No No No No No Disabled by default in Java 8
Implementation DH-ANON (Insecure) SRP SRP-DSS SRP-RSA PSK-RSA PSK DHE-PSK ECDHE-PSK ECDH-ANON (Insecure)

Encryption algorithms[edit]

Implementation 3DES-CBC AES-CBC AES-GCM[43] AES-CCM[44] CAMELLIA-CBC[45] CAMELLIA-GCM[46] SEED-CBC[47] DES-CBC (Insecure) RC4-128 (Insecure) RC4-40 (Insecure) CHACHA20-POLY1305[48][49] GOST28147-89[29]
Botan Yes Yes Yes Yes Yes Yes Yes No Yes No No No
cryptlib Yes Yes Yes No No No No No Yes No No No
CyaSSL Yes Yes Yes Yes Yes No No No Yes No No No
GnuTLS Yes Yes Yes No Yes Yes No No Yes Disabled by default No No
MatrixSSL Yes Yes Yes No No No Yes No Yes No No No
NSS Yes Yes Yes[50] No Yes[51][52] No[53] Yes[54] Disabled by default Yes Disabled by default Partial[58] No
OpenSSL Yes Yes Yes [19] No Yes No No Yes Yes Yes Partial[59] Yes
PolarSSL Yes Yes Yes No Yes Yes No Disabled by default Yes No No No
SChannel XP/2003 Yes 2003 only[60] No No No No No yes Yes yes No 3rd Party
SChannel Vista/2008 Yes Yes No No No No No Disabled by default Yes Disabled by default No 3rd Party
SChannel 7/2008R2 Yes Yes ECHDE_ECDSA only[61] No No No No Disabled by default Disabled by IE11 except as a fallback if no other enabled algorithm works Disabled by default No 3rd Party
SChannel 8/2012 Yes Yes ECDHE_ECDSA only[61] No No No No Disabled by default Yes Disabled by default No 3rd Party
SChannel 8.1/2012 R2 Yes Yes ECDHE_ECDSA only[61] No No No No Disabled by default Disabled except as a fallback if no other enabled algorithm works Disabled by default No 3rd Party
Secure Transport Yes Yes Yes Yes No No No Yes Yes Yes No No
JSSE Yes Yes Yes No No No No Disabled by default Yes Disabled by default [62] No No[33]
Implementation 3DES-CBC AES-CBC AES-GCM AES-CCM CAMELLIA-CBC CAMELLIA-GCM SEED-CBC DES-CBC (Insecure) RC4-128 (Insecure) RC4-40 (Insecure) CHACHA20-POLY1305 GOST28147-89

Supported elliptic curves[edit]

This section lists the supported elliptic curves by each implementation.

Implementation Arbitrary curves Arbitrary char2 curves sect163k1 (1) sect163r1 (2) sect163r2 (3) sect193r1 (4) sect193r2 (5) sect233k1 (6) sect233r1 (7) sect239k1 (8) sect283k1 (9) sect283r1 (10) sect409k1 (11) sect409r1 (12) sect571k1 (13) sect571r1 (14)
Botan No No No No No No No No No No No No No No No No
CyaSSL No No No No No No No No No No No No No No No No
GnuTLS No No No No No No No No No No No No No No No No
MatrixSSL No No No No No No No No No No No No No No No No
NSS No No Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes
OpenSSL Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes
PolarSSL No No No No No No No No No No No No No No No No
Secure Transport No No No No No No No No No No No No No No No No
JSSE No No Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes
Implementation Arbitrary curves Arbitrary char2 curves sect163k1 sect163r1 sect163r2 sect193r1 sect193r2 sect233k1 sect233r1 sect239k1 sect283k1 sect283r1 sect409k1 sect409r1 sect571k1 sect571r1
Implementation secp160k1 (15) secp160r1 (16) secp160r2 (17) secp192k1 (18) secp192r1 prime192v1 (19) secp224k1 (20) secp224r1 (21) secp256k1 (22) secp256r1 prime256v1 (23) secp384r1 (24) secp521r1 (25) brainpoolP256r1 (26) brainpoolP384r1 (27) brainpoolP512r1 (28)
Botan No Yes No No Yes No Yes No Yes Yes Yes Yes Yes Yes
CyaSSL No Yes No No Yes No Yes No Yes Yes Yes No No No
GnuTLS No No No No Yes No Yes No Yes Yes Yes No No No
MatrixSSL No No No No Yes No Yes No Yes Yes Yes No No No
NSS Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes No[63] No[63] No[63]
OpenSSL Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes[64][65] Yes[64][65] Yes[64][65]
PolarSSL No No No Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes
Secure Transport No No No No Yes No No No Yes No Yes No No No
JSSE Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes No No No
Implementation secp160k1 secp160r1 secp160r2 secp192k1 secp192r1 prime192v1 secp224k1 secp224r1 secp256k1 secp256r1 prime256v1 secp384r1 secp521r1 brainpoolP256r1 brainpoolP384r1 brainpoolP512r1

Assisted cryptography[edit]

This section lists the known ability of an implementation to take advantage of CPU instruction sets that optimize encryption, or utilize system specific devices that allow access to underlying cryptographic hardware for acceleration or for data separation.

Implementation PKCS #11 device Intel AES-NI VIA PadLock STM32F2 Cavium NITROX Freescale CAU/mmCAU ARMv8-A Microchip PIC32MZ
Botan No Yes No No No No No No
cryptlib Yes No Yes No No No No No
CyaSSL No Yes No Yes Yes Yes No Yes
GnuTLS Yes Yes Yes No No No No No
MatrixSSL Yes Yes No No No No No No
NSS Yes[66] Yes[67] No[68] No No No No No
OpenSSL No Yes Yes No Yes No No No
PolarSSL Yes Yes[69] Yes No No No No No
SChannel No Yes No No No No No No
Secure Transport No No No No No No Yes No
JSSE Yes Yes[70] No No No No No No
Implementation PKCS #11 device Intel AES-NI VIA PadLock STM32F2 Cavium NITROX Freescale CAU/mmCAU ARMv8-A Microchip PIC32MZ

System-specific backends[edit]

This section lists the ability of an implementation to take advantage of the available operating system specific backends, or even the backends provided by another implementation.

Implementation /dev/crypto Windows CSP CommonCrypto OpenSSL Engine
Botan No No No No
cryptlib No No No No
CyaSSL No Partial No No
GnuTLS Yes No No No
MatrixSSL No No Yes Yes
NSS No No No No
OpenSSL Yes No No Yes
PolarSSL No No No No
SChannel No Yes No No
Secure Transport No No Yes No
JSSE No Yes No No
Implementation /dev/crypto Windows CSP CommonCrypto OpenSSL Engine

MAC functions[edit]

Implementation AEAD HMAC-MD5 HMAC-SHA-1 HMAC-SHA-256 GOST28147-89-MAC[29] GOST 34.11-94[29]
Botan Yes Yes Yes Yes No No
cryptlib Yes Yes Yes Yes No No
CyaSSL Yes Yes Yes Yes No No
GnuTLS Yes Yes Yes Yes No No
MatrixSSL Yes Yes Yes Yes No No
NSS Yes Yes Yes Yes No No
OpenSSL Yes Yes Yes Yes Yes Yes
PolarSSL Yes Yes Yes Yes No No
SChannel XP/2003 No Yes Yes No 3rd Party 3rd Party
SChannel Vista/2008 No Yes Yes No 3rd Party 3rd Party
SChannel 7/2008R2 ECDHE_ECDSA only Yes Yes Yes 3rd Party 3rd Party
SChannel 8/2012 ECDHE_ECDSA only Yes Yes Yes 3rd Party 3rd Party
Secure Transport Yes Yes Yes Yes No No
JSSE Yes Yes Yes Yes No[33] No[33]
Implementation AEAD HMAC-MD5 HMAC-SHA-1 HMAC-SHA-256 GOST28147-89-MAC GOST 34.11-94

Compression[edit]

Note the CRIME security exploit takes advantage of TLS compression, so conservative implementations do not enable compression at the TLS level. HTTP compression is unrelated and unaffected by this exploit, but is exploited by the related BREACH attack.

Implementation DEFLATE[71]
(Insecure)
Botan No
cryptlib No
CyaSSL Disabled by default
GnuTLS Disabled by default
MatrixSSL Disabled by default
NSS Disabled by default
OpenSSL Yes
PolarSSL Disabled by default
SChannel No
Secure Transport No
JSSE No
Implementation DEFLATE

Cryptographic module/token support[edit]

Implementation TPM support Hardware token support Objects identified via
Botan No No
cryptlib No PKCS11 User-defined label
CyaSSL No No
GnuTLS Yes PKCS11 PKCS #11 URLs[72]
MatrixSSL No PKCS11
NSS No PKCS11
OpenSSL Yes PKCS11 (via external module) Custom method
PolarSSL No PKCS11 (via libpkcs11-helper) or standard hooks Custom method
SChannel No Microsoft CryptoAPI UUID, User-defined label
JSSE No PKCS11 Java Cryptography Architecture/
Java Cryptography Extension
Implementation TPM support Hardware token support Objects identified via

Extensions[edit]

In this section the extensions each implementation supports are listed. Note that the Secure Renegotiation extension is critical for HTTPS client security. TLS clients not implementing it are vulnerable to attacks, irrespective of whether the client implements TLS renegotiation.

Implementation Secure
Renegotiation[73]
Server Name
Indication[74]
Application Layer
Protocol Negotiation
[75]
Certificate Status
Request
[74]
OpenPGP[76] Supplemental
Data[77]
Session
Ticket[78]
Keying Material
Exporter[79]
Maximum
Fragment Length[74]
Truncated
HMAC[74]
Botan Yes Yes Unknown No No No Yes Yes Yes No
cryptlib Yes Yes Unknown No No Yes No No No[80] No
CyaSSL No Yes Unknown No No No Yes No Yes Yes
GnuTLS Yes Yes Yes Yes Yes Yes Yes Yes Yes No
MatrixSSL Yes Yes Unknown No No No Yes No Yes Yes
NSS Yes Yes Yes Yes No No Yes Yes No No
OpenSSL Yes Yes Yes Yes No No? Yes Yes? No No
PolarSSL Yes Yes Unknown No No No Yes No Yes Yes
SChannel Yes Yes Yes Yes No Yes No[81] No No No
Secure Transport Yes Yes Unknown No No Yes No No No No
JSSE Yes Yes[82] Unknown No No No No No No No
Implementation Secure
Renegotiation
Server Name
Indication
Application Layer
Protocol Negotiation
Certificate Status
Request
OpenPGP Supplemental
Data
Session
Ticket
Keying Material
Exporter
Maximum
Fragment Length
Truncated
HMAC

Code size and dependencies[edit]

Implementation Code size Dependencies Optional
dependencies
Botan 32 kLoc C++11 sqlite, zlib (compression), bzip2 (compression), liblzma (compression)
CyaSSL 67 kLoc None libc, zlib (compression)
GnuTLS 138 kLoc libc
nettle
gmp
zlib (compression)
p11-kit (PKCS #11)
trousers (TPM)
MatrixSSL 22 kLoc none zlib (compression)
MatrixSSL-open 18 kLoc libc or newlib
NSS 400 kLoc libc
libnspr4
libsoftokn3
libplc4
libplds4
zlib (compression)
OpenSSL 159 kLoc libc zlib (compression)
PolarSSL 14 kLOC libc libpkcs11-helper (PKCS #11)
zlib (compression)
JSSE 37 kLoc

(Framework and Oracle provider)

Java
Implementation Code size Dependencies Optional
dependencies

Development environment[edit]

Implementation Namespace Build Tools API Manual Crypto Back-end OpenSSL Compatibility Layer[clarify]
Botan Botan::TLS Makefile Sphinx Included (monolithic) No
cryptlib crypt* makefile, MSVC project workspaces Programmers reference manual (PDF), architecture design manual (PDF) Included (monolithic) No
CyaSSL CyaSSL_*

SSL_*

Autoconf, automake, libtool, MSVC project workspaces, XCode projects, CodeWarrior projects, MPLAB X projects, Keil, IAR, Clang, GCC Manual and API Reference (HTML, PDF) Included (monolithic) Yes (about 10% of API)
GnuTLS gnutls_* Autoconf, automake, libtool Manual and API reference (HTML, PDF) External, libnettle Yes (limited)
MatrixSSL matrixSsl_*

ps*

Makefile, MSVC project workspaces, Xcode projects for Mac OS X and iOS API Reference (PDF), Integration Guide Included (pluggable) Yes (Subset: SSL_read, SSL_write, etc.)
NSS CERT_*

SEC_*
SECKEY_*
NSS_*
PK11_*
SSL_*
...

Makefile Manual (HTML) Included, PKCS#11 based[83] Yes (separate package called nss_compat_ossl[84])
OpenSSL SSL_*

SHA1_*
MD5_*
EVP_*
...

Makefile Man pages Included (monolithic) N/A
PolarSSL ssl_*

sha1_*
md5_*
x509parse_*
...

Makefile, CMake, MSVC project workspaces API Reference + High Level and Module Level Documentation (HTML) Included (monolithic) No
JSSE javax.net.ssl Makefile API Reference (HTML) +

Java SE 7

Java Cryptography Architecture/
Java Cryptography Extension
No
Implementation Namespace Build Tools API Manual Crypto Back-end OpenSSL Compatibility Layer

Portability concerns[edit]

Implementation Platform Requirements Network Requirements Thread Safety Random Seed Able to Cross-Compile No OS (Bare Metal) Supported Operating Systems
Botan C++11 None Thread-safe Platform-dependent Yes Most Windows and POSIX systems
cryptlib C89 POSIX send() and recv(). API to supply your own replacement Thread-safe Platform-dependent, including hardware sources Yes AMX, BeOS, ChorusOS, DOS, eCOS, FreeRTOS/OpenRTOS, uItron, MVS, OS/2, Palm OS, QNX Neutrino, RTEMS, Tandem NonStop, ThreadX, uC/OS II, Unix (AIX, FreeBSD, HPUX, Linux, OS X, Solaris, etc.), VDK, VM/CMS, VxWorks, Win16, Win32, Win64, WinCE/PocketPC/etc, XMK
CyaSSL C89 POSIX send() and recv(). API to supply your own replacement. Thread-safe, needs mutex hooks if PThreads or WinThreads not available, can be turned off Random seed set through CTaoCrypt Yes Yes Win32/64, Linux, Mac OS X, Solaris, ThreadX, VxWorks, FreeBSD, NetBSD, OpenBSD, embedded Linux, Haiku, OpenWRT, iPhone (iOS), Android, Nintendo Wii and Gamecube through DevKitPro, QNX, MontaVista, OpenCL, NonStop, TRON/ITRON/µITRON, Micrium's µC OS, FreeRTOS, SafeRTOS, Freescale MQX, Nucleus, TinyOS, HP/UX, Keil RTX
GnuTLS C89 POSIX send() and recv(). API to supply your own replacement. Thread-safe, needs custom mutex hooks if neither POSIX nor Windows threads are available. platform dependent Yes Generally any POSIX platforms or Windows, commonly tested platforms include GNU/Linux, Win32/64, Mac OS X, Solaris, OpenWRT, FreeBSD, NetBSD, OpenBSD.
MatrixSSL C89 none Thread-safe platform dependent Yes Yes All
NSS C89, NSPR[85] NSPR[85] PR_Send() and PR_Recv(). API to supply your own replacement. Thread-safe Platform dependent[86] Yes (but cumbersome) AIX, Android, FreeBSD, NetBSD, OpenBSD, BeOS, HP-UX, IRIX, Linux, Mac OS X, OS/2, Solaris, OpenVMS, Amiga DE, Windows, WinCE, Sony PlayStation
OpenSSL C89?  ? Needs mutex callbacks Set through native API Unix, DOS (with djgpp), Windows, OpenVMS, MacOS, NetWare
PolarSSL C89 POSIX read() and write(). API to supply your own replacement. Threading layer available (POSIX or own hooks) Random seed set through entropy pool Yes Yes Known to work on: Win32/64, Linux, Mac OS X, Solaris, FreeBSD, NetBSD, OpenBSD, OpenWRT, iPhone (iOS), Xbox, Android, SeggerOS
JSSE Java Java SE network components Thread-safe Depends on java.security.SecureRandom Yes Java based, platform-independent
Implementation Platform Requirements Network Requirements Thread Safety Random Seed Able to Cross-Compile No OS (Bare Metal) Supported Operating Systems

See also[edit]

  • SCTP — with DTLS support
  • DCCP — with DTLS support
  • SRTP — with DTLS support (DTLS-SRTP) and Secure Real-Time Transport Control Protocol (SRTCP)

References[edit]

  1. ^ www.realtimelogic.com
  2. ^ RFC6176: Prohibiting Secure Sockets Layer (SSL) Version 2.0
  3. ^ "CBC-Padding: Security Flaws in SSL, IPsec, WTLS,...", Serge Vaudenay, 2001
  4. ^ Rizzo/Duong BEAST Countermeasures
  5. ^ TLSv1.2's Major Differences from TLSv1.1
  6. ^ a b RFC 6347
  7. ^ "Bard attack". CiteSeerX: 10.1.1.61.5887. 
  8. ^ SSLv2 is insecure
  9. ^ RFC 6101
  10. ^ RFC 2246
  11. ^ RFC 4346
  12. ^ a b c d e f g h RFC 5246
  13. ^ RFC 4347
  14. ^ a b c d SSLv2 client hello is supported
  15. ^ a b "NSS 3.14 release notes". Mozilla Developer Network. Mozilla. Retrieved 2012-10-27. 
  16. ^ "NSS 3.15.1 release notes". Mozilla Developer Network. Mozilla. Retrieved 2013-08-10. 
  17. ^ a b "Bug 681065 - (dtls) Implement DTLS (Datagram TLS) in libssl". Mozilla. Retrieved 2013-11-18. 
  18. ^ "Bug 959864 - Support DTLS 1.2". Mozilla. Retrieved 2014-01-25. 
  19. ^ a b c d www.openssl.org/news/changelog.html
  20. ^ TLS cipher suites in Microsoft Windows XP and 2003
  21. ^ SChannel Cipher Suites in Microsoft Windows Vista
  22. ^ TLS Cipher Suites in SChannel for Windows 7, 2008R2, 8, 2012
  23. ^ a b "An update is available that adds support for DTLS in Windows 7 SP1 and Windows Server 2008 R2 SP1". Microsoft. Retrieved 13 November 2012. 
  24. ^ "Technical Note TN2287: iOS 5 and TLS 1.2 Interoperability Issues". iOS Developer Library. Apple Inc. Retrieved 2012-05-03. 
  25. ^ "Bug 663320 - (NSA-Suite-B-TLS) Implement RFC5430 (NSA Suite B profile for TLS)". Mozilla. Retrieved 2014-01-25. 
  26. ^ http://docs.oracle.com/javase/8/docs/technotes/guides/security/enhancements-8.html
  27. ^ http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm
  28. ^ a b c d e RFC 4492
  29. ^ RFC 4357
  30. ^ a b Client side only
  31. ^ a b Mozilla.org. "Bug 102794 - Implement the server-side code of the DHE SSL ciphersuites.". Retrieved 19 November 2013. 
  32. ^ a b c d Extensions to support this functionality might be available.
  33. ^ RFC 3280
  34. ^ RFC 2560
  35. ^ a b "How Certificate Revocation Works". Microsoft TechNet. Microsoft. March 16, 2012. Retrieved July 10, 2013. 
  36. ^ a b c RFC 5054
  37. ^ a b c RFC 4279
  38. ^ RFC 5489
  39. ^ a b c "Bug 405155 - add support for TLS-SRP, rfc5054". Mozilla. Retrieved 2014-01-25. 
  40. ^ a b c d "Bug 306435 - Mozilla browsers should support the new IETF TLS-PSK protocol to help reduce phishing". Mozilla. Retrieved 2014-01-25. 
  41. ^ a b c As of iOS 7, PSK ciphers are enumerated in the headers but there are no APIs that use them.
  42. ^ RFC 5288
  43. ^ RFC 6655
  44. ^ RFC 5932
  45. ^ RFC 6367
  46. ^ RFC 4162
  47. ^ draft-agl-tls-chacha20poly1305-04
  48. ^ As of December 2013, only available on Google services
  49. ^ "NSS 3.15.2 release notes". Mozilla Developer Network. Mozilla. Retrieved 2013-09-26. 
  50. ^ "Bug 361025 - Support for Camellia Cipher Suites to TLS RFC4132". Mozilla. Retrieved 2013-11-19. 
  51. ^ "NSS 3.12 is released". Retrieved 2013-11-19. 
  52. ^ "Bug 940119 - libssl does not support any TLS_ECDHE_*_CAMELLIA_*_GCM cipher suites". Mozilla. Retrieved 2013-11-19. 
  53. ^ "Bug 453234 - Support for SEED Cipher Suites to TLS RFC4010". Mozilla. Retrieved 2013-12-01. 
  54. ^ a b "Issue 310768: Support ChaCha20+Poly1305 TLS cipher suites". Google. Retrieved 2013-12-01. 
  55. ^ "Chrome 32 promotes Chacha20/Poly1305 suite, SSL Client Test fails to process SSL/TLS handshake". Qualys. Retrieved 2013-12-01. 
  56. ^ "Bug 917571 - Support ChaCha20+Poly1305 cipher suites". Mozilla. Retrieved 2013-12-01. 
  57. ^ As of December 2013, only available on private version of NSS integrated into Chromium (implementation is still ongoing).[55][56] Patch for NSS upstream has been submitted and under review.[57]
  58. ^ As of December 2013, only available on private version of OpenSSL integrated into Chromium (implementation is still ongoing).[55]
  59. ^ Hofix 984963: TLS AES cipher suites for Microsoft Windows 2003
  60. ^ a b c Support is erratic, in many cases SChannel will simply drop the connection if a suite with this algorithm is specified.
  61. ^ http://docs.oracle.com/javase/8/docs/technotes/guides/security/SunProviders.html
  62. ^ a b c "Bug 943639 - Support for Brainpool ECC Curve (rfc5639)". Mozilla. Retrieved 2014-01-25. 
  63. ^ a b c "OpenSSL RT #2239: [PATCH] RFC 5639 support - resolved 2012-04-22". OpenSSL.org. Retrieved 2014-02-03. 
  64. ^ a b c "openssl-1.0.2-stable prerelease tarballs available on OpenSSL's FTP server: files openssl-1.0.2-stable-SNAP-*.tar.gz". OpenSSL.org. Retrieved 2014-02-03. 
  65. ^ Normally NSS's libssl performs all operations via the PKCS#11 interface, either to hardware or software tokens
  66. ^ "Bug 706024 - AES-NI enhancements to NSS on Sandy Bridge systems". Retrieved 2013-09-28. 
  67. ^ "Bug 479744 - RFE : VIA Padlock ACE support (hardware RNG, AES, SHA1 and SHA256)". Retrieved 2014-04-11. 
  68. ^ "We've incorporated support for AES-NI in our AES and GCM modules". 2013-12-31. Retrieved 2014-01-07. 
  69. ^ http://stackoverflow.com/questions/14259671/java-ssl-provider-with-aes-ni-support
  70. ^ RFC 3749
  71. ^ PKCS #11 URLs is a way to refer to objects stored in PKCS #11 tokens
  72. ^ RFC 5746
  73. ^ a b c d RFC 6066
  74. ^ draft-ietf-tls-applayerprotoneg
  75. ^ RFC 6091
  76. ^ RFC 4680
  77. ^ RFC 5077
  78. ^ RFC 5705
  79. ^ Present but disabled by default due to lack of use by any implementation.
  80. ^ Supported in Windows 8.1 Preview and Windows Server 2012 R2 Preview; see What's New in TLS/SSL (Schannel SSP)
  81. ^ http://docs.oracle.com/javase/8/docs/technotes/guides/security/enhancements-8.html
  82. ^ On the fly replaceable/augmentable.
  83. ^ http://fedoraproject.org/wiki/Nss_compat_ossl
  84. ^ a b Netscape Portable Runtime (NSPR)
  85. ^ For Unix/Linux it uses /dev/urandom if available, for Windows it uses CAPI. For other platforms it gets data from clock, and tries to open system files. NSS has a set of platform dependent functions it uses to determine randomness.