Open Utopiah opened 1 year ago
relying on nodejs --shared-openssl with the oqs-provider plugin, cf details on providers, seems like a more maintainable path.
If you hadn't added that, that'd been my recommendation, too. We really want to move off oqs-openssl111
...
Now, the bigger issue I see is that our code does not provide a cipher (in either oqsprovider
or oqs-openssl
), but only KEM and signature algorithms. As I don't know enough about Express
there's probably some more investigation required... If this can make use of signature or KEM algorithms, then, yes, the path you propose sounds doable. Feel free to keep us posted on what you find going forward (or want to bounce off further ideas).
The servers provided, in particular reverse proxies like nginx, cover most Web services.
Still numerous ones rely on NodeJS directly via popular framework like Express itself allowing some customization.
My understanding is that NodeJS ships with OpenSSL and defaults to it with its cipher suite that can be customized.
Consequently I believe a demo could be made by
node -pe process.versions
node --tls-cipher-list='falcon512' server.js
then open it with oqs chromiumDoes this seem like a realistic path?
Edit: relying on nodejs
--shared-openssl
with the oqs-provider plugin, cf details on providers, seems like a more maintainable path.