docs: document the (weak) random value situation in rustls builds

Closes #14770
This commit is contained in:
Daniel Stenberg 2024-09-03 16:09:40 +02:00
parent 4e16f8aa6a
commit 9e629a1484
No known key found for this signature in database
GPG Key ID: 5CC908FDB71E12C2
2 changed files with 18 additions and 0 deletions

View File

@ -40,6 +40,8 @@ Graduation requirements:
- HTTP/1 and HTTP/2 support, including multiplexing
(Hyper is marked for deprecation. It cannot graduate.)
### HTTP/3 support (non-ngtcp2 backends)
Graduation requirements:
@ -54,6 +56,7 @@ Graduation requirements:
Graduation requirements:
- a reasonable expectation of a stable API going forward.
- a sufficient approach to avoid using weak random numbers
### WebSocket

View File

@ -29,3 +29,18 @@ Now configure and build curl with Rustls:
% autoreconf -fi
% ./configure --with-rustls=${HOME}/rustls-ffi-built
% make
## Randomness
Every TLS libcurl curl supports - *except* Rustls - provides a function for
curl to extract cryptographically safe random numbers with.
When you build curl with Rustls, curl uses its own internal attempts to get a
decent random value:
1. Windows specific APIs
2. arc4random
If neither of those are present, then curl using Rustls falls back to **weak
pseudo-random values**, and thus weakening several curl authentication
implementations.