Fact-checked by Grok 2 weeks ago

LibreSSL

LibreSSL is an open-source implementation of the (TLS) and cryptographic library, forked from in April 2014 by developers from the project. It serves as a portable version of the cryptographic stack integrated into , providing secure networking protocols for applications across various platforms including , , macOS, and Windows. The fork was primarily triggered by the vulnerability (CVE-2014-0160) in , which exposed serious security flaws and poor maintenance practices in the original codebase, such as ignored bug reports and retention of outdated features like support for Visual C++ 5.0. Key OpenBSD contributors, including and Ted Unangst, initiated the project to address these issues after discovering additional unfixed bugs, like a freelist reuse vulnerability and a long-standing reported in OpenSSL ticket #2167. Unlike , which continued to accumulate complexity, LibreSSL emphasized rapid removal of insecure or obsolete code to enhance auditability and reliability. LibreSSL's core goals include modernizing the codebase for better security, applying rigorous development processes such as code audits and pledge-based privilege separation inspired by , and improving portability without compromising performance. Notable features encompass a simplified , removal of deprecated algorithms like and where possible, and integration of a high-level libtls library for easier TLS usage, which abstracts away much of the complexity found in 's interfaces. The project prioritizes proactive vulnerability mitigation, ensuring that issues like those in subsequent releases—such as memory leaks in 2016—do not affect LibreSSL. Development occurs primarily within the OpenBSD source tree, with stable releases derived from OpenBSD versions and supported for approximately one year, followed by security updates as needed; the latest stable release as of October 2025 is version 4.2.1. Backed by the Foundation, LibreSSL is actively maintained and used in OpenBSD systems, while portable builds enable adoption in other environments, though it has seen limited uptake compared to due to compatibility concerns.

Overview

Description and Purpose

LibreSSL is an open-source cryptographic library that implements the (TLS) protocol, serving as a secure foundation for encrypted communications in network applications. It originated as a of the project in 2014, retaining compatibility while pursuing distinct development objectives. The name derives from Secure Sockets Layer (SSL), the predecessor protocol to TLS, reflecting its focus on secure socket communications. The primary purpose of LibreSSL is to provide a robust, audited TLS and stack that prioritizes and code quality. Developers aimed to modernize the inherited codebase by removing deprecated features, simplifying complex structures, and enhancing overall maintainability. This effort draws on best-practice development processes established in the project, including rigorous code reviews, continuous auditing, and a commitment to minimizing attack surfaces through conservative design choices. LibreSSL emphasizes portability across diverse platforms, making it suitable for both general-purpose systems and resource-constrained environments. It is regularly packaged for operating systems such as , , , macOS, and Windows, ensuring broad applicability without sacrificing principles. By focusing on a leaner implementation, LibreSSL supports efficient deployment in scenarios requiring reliable cryptographic operations, from servers to client applications.

Licensing and Development

LibreSSL is licensed under a combination of the for new code and the license for the original forked code, both permissive open-source licenses similar to the that allow broad use, modification, and redistribution of the software with minimal restrictions, while requiring preservation of the original copyright notice and disclaimer. This licensing approach aligns with OpenBSD's standard policy for new code contributions, ensuring compatibility with a wide range of projects and facilitating adoption across various platforms. The primary development of LibreSSL takes place within the project's source tree, where it is integrated as the base system's cryptographic library and undergoes rigorous auditing for security and code quality. For non- operating systems, a portable version is maintained separately through the libressl-portable repository on , which includes build scaffolds and compatibility layers to support platforms such as , , Windows, and others. Contributions from developers worldwide are encouraged via patches submitted to the mailing lists or the portable repository's issue tracker, fostering a collaborative development model. Funding for LibreSSL's development is provided by the , which supports infrastructure, developer initiatives, and security audits for the project and related OpenBSD components. The foundation solicits donations to sustain these efforts, enabling ongoing improvements and porting work. LibreSSL follows a release cadence aligned with the project, introducing new stable branches approximately every six months to incorporate enhancements and fixes, while providing ongoing security patches for existing branches to address vulnerabilities promptly. This schedule ensures timely updates without compromising the project's emphasis on stability and thorough testing.

History

Fork from OpenSSL

LibreSSL originated as a of the cryptographic library, initiated by the development team in April 2014, based on version 1.0.1g. This action was directly prompted by the discovery of the vulnerability (CVE-2014-0160), a critical flaw in 's implementation of the TLS heartbeat extension that allowed remote attackers to read sensitive data from server memory, exposing widespread security risks in the library's design and maintenance practices. In the immediate aftermath of the , the team conducted an intensive of the codebase, identifying and removing over 90,000 lines of C code deemed insecure, obsolete, or unnecessary within the first week of development. This cleanup targeted bloat such as unused algorithms, deprecated platform support, and poorly maintained components that contributed to 's to exploits and slow response to patches. The primary motivations for the fork centered on addressing these systemic issues in , including its accumulated code debt, inconsistent security ing, and reactive patching culture, with the goal of creating a leaner, proactively secured library through rigorous and minimalist design principles aligned with 's security philosophy. From the outset, efforts were made to ensure LibreSSL's portability beyond , involving the adaptation of platform-specific code and the development of a separate portable branch to support , , and other systems. The first portable release, LibreSSL 2.0.0, was made available on July 11, 2014, just three months after the , enabling broader adoption while maintaining compatibility with OpenSSL's where possible.

Major Releases and Milestones

LibreSSL's development began with its initial stable release, version 2.0.0, on July 11, 2014, which was derived from the 5.6 development snapshot and served as the first post-fork version from . This release introduced the portable variant shortly thereafter, enabling builds on non- platforms such as , macOS, and Windows, thereby broadening its applicability beyond the ecosystem. From its inception, LibreSSL has been the primary TLS library in , starting with version 5.6 in November 2014 and continuing through subsequent releases, including 7.0 in October 2021. The project maintained the 2.x series through several updates, focusing on stability and security fixes, before transitioning to the 3.x branch with the release of version 3.0.0 on August 5, 2019. The 3.x series progressed with regular stable releases, such as 3.7.2 in April 2023, and concluded its development cycle with the preview release of 3.9.0 on March 9, 2024, alongside the stable 3.8.3. These updates emphasized code audits, performance optimizations, and compatibility enhancements while addressing accumulated bug backlogs from upstream sources. In October 2024, LibreSSL shifted to the 4.x series with version 4.0.0, introducing further codebase cleanups and platform-specific improvements like support. The branch continued with 4.1.0 in April 2025, adding hardware architecture support such as loongarch64, and reached its latest stable release, 4.2.1, on October 30, 2025, which included reliability fixes for TLSv1.3 operations. As of November 2025, LibreSSL does not yet support algorithms in its enabled feature set, despite importing some related APIs like ML-KEM in version 4.1.0 for future evaluation. Throughout its releases, LibreSSL has prioritized regular security updates and bug resolutions, resulting in a notably shorter history of (CVEs) compared to , with no high-severity issues reported in recent branches as of late 2022. This approach has helped mitigate inherited vulnerabilities while maintaining a leaner .

Technical Architecture

Core Components

LibreSSL employs a modular design centered around three primary libraries: libcrypto, which supplies fundamental primitives such as hashing, , and digital signatures; libssl, which handles the implementation of the (TLS) protocol for secure communications; and libtls, a high-level built on libssl that simplifies TLS usage for applications. These libraries form the core of LibreSSL's functionality, enabling developers to integrate cryptographic operations and TLS support into applications. Additionally, LibreSSL releases incorporate utility tools, including the openssl binary, which serves purposes like certificate generation, , and diagnostic testing of cryptographic configurations. To ensure cross-platform compatibility, the libressl-portable project provides essential adaptations beyond the native environment. This project includes a build and that ports the core OpenBSD-sourced code to diverse operating systems, such as , , Windows, and . It addresses platform-specific needs through features like optimizations tailored for architectures including x86 and , allowing efficient performance on varied hardware without altering the underlying codebase. LibreSSL integrates seamlessly with system-level resources by depending on the standard library for critical operations like allocation and threading, eschewing or implementations to promote portability and reduce potential vulnerabilities. This approach contrasts with more solutions in libraries, fostering reliance on well-vetted OS primitives. Furthermore, LibreSSL maintains a significantly smaller codebase than , which enhances code auditability and simplifies security reviews.

Supported Protocols and Algorithms

LibreSSL provides native support for (TLS) protocols from version 1.0 through 1.3, with TLS 1.3 enabled as the default where feasible to prioritize modern security standards. This implementation excludes deprecated Secure Sockets Layer (SSL) protocols such as SSL 2.0 and SSL 3.0, which were removed early in the project's to eliminate known vulnerabilities associated with legacy SSL. In terms of cryptographic primitives, LibreSSL supports symmetric encryption algorithms including AES in Galois/Counter Mode (AES-GCM) and ChaCha20-Poly1305 for authenticated encryption with associated data (AEAD). For asymmetric cryptography, it includes key exchange mechanisms such as Elliptic Curve Diffie-Hellman (ECDH) and Rivest-Shamir-Adleman (RSA). Hash functions are limited to secure options like SHA-256 and SHA-384, with MD5 and SHA-1 disallowed for establishing new connections to prevent downgrade attacks and ensure robust integrity protection. LibreSSL incorporates modern elliptic curves for efficient and secure key operations, including for high-performance Diffie-Hellman exchanges, as well as NIST P-256 and curves standardized by the National Institute of Standards and Technology. These selections emphasize resistance to known attacks while maintaining compatibility with contemporary protocols. As of 2025, LibreSSL does not offer support for legacy compliance modes such as validation or integration with authentication, reflecting a deliberate focus on streamlined, secure implementations over outdated requirements.

Security Enhancements

Memory Safety Improvements

LibreSSL enhances by replacing OpenSSL's custom memory allocation mechanisms, such as CRYPTO_malloc, with wrappers around standard library functions like malloc and free. This shift improves predictability in , eliminates OpenSSL's non-freeing LIFO that retained memory indefinitely, and facilitates detection of issues like buffer overflows through integration with operating system tools and debuggers. In development and testing, LibreSSL incorporates AddressSanitizer () and similar compile-time checks to identify memory errors, including use-after-free and heap overflows, ensuring early detection of vulnerabilities before releases. These tools are integrated into pipelines, such as GitHub Actions builds that enable for thorough validation. Proactive auditing in LibreSSL emphasizes constant-time implementations to prevent timing side-channel attacks, with operations like and big-number arithmetic (BN) functions defaulting to constant-time modes where feasible. Bounds checking is rigorously applied in buffer operations to avert overflows, drawing from OpenBSD's practices that scrutinize memory accesses for safety. To reduce the , LibreSSL eliminates deprecated APIs and legacy code from that were prone to memory leaks and overflows, removing over 140,000 lines (about 23% of the codebase) to focus on essential, audited functionality. This cleanup minimizes opportunities for exploitation while maintaining compatibility for critical use cases.

Cryptographic Changes

LibreSSL has incorporated modern with associated data (AEAD) ciphers to enhance security against common vulnerabilities in older symmetric encryption modes. Notably, support for was introduced in version 2.3.2, providing a high-speed, secure to AES-based ciphers that performs well on devices without dedicated . This implementation was updated to the IETF standard in version 2.6.5, ensuring compatibility with RFC 7905 and enabling its use in TLS cipher suites like TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256. Additionally, LibreSSL includes hardware-accelerated support for AES-GCM modes through AES-NI instructions, available since early versions and refined in assembly optimizations for amd64 architectures. This acceleration applies to AES-128-GCM and AES-256-GCM, improving performance in TLS handshakes and data encryption while maintaining resistance to nonce-reuse attacks when used correctly. Benchmarks indicate that while LibreSSL's AES-GCM implementation leverages AES-NI effectively, it may lag behind in throughput due to differing optimization strategies. To address vulnerabilities in legacy hashing algorithms, LibreSSL has deprecated and restricted the use of and in critical operations such as digital signatures and key derivation functions. These hashes were removed from default TLS signature schemes in alignment with RFC 9155, preventing their selection in protocols like TLS 1.2 and 1.3 to mitigate collision attacks. For key derivation, and other mechanisms now default to SHA-256 or stronger, with and explicitly disallowed in new contexts to enforce modern security standards. Elliptic curve cryptography in LibreSSL has been strengthened with native support for Curve25519-based primitives. for key exchange was integrated via the EVP interface in version 3.7.0, offering constant-time Diffie-Hellman operations resistant to timing attacks and side-channel exploits. Similarly, for digital signatures was added in the same release, both as a low-level primitive and through EVP APIs, providing 128-bit security levels with smaller key sizes compared to NIST curves like P-256. These enhancements prioritize performance and security for protocols such as TLS and SSH. As of , LibreSSL maintains a focus on classical without integration of post-quantum algorithms, emphasizing audited, efficient implementations of established standards over experimental quantum-resistant schemes.

Differences from

Removals of Insecure Features

LibreSSL developers prioritized the elimination of legacy and vulnerable components inherited from to mitigate risks associated with outdated cryptographic protocols and configurations. This approach involved systematically purging code that supported insecure mechanisms, thereby reducing the codebase's complexity and potential for exploitation. These removals were guided by the project's security-focused philosophy, originating from the team following the incident. A key removal was support for the SSLv2 and SSLv3 protocols, both of which suffer from fundamental design flaws enabling attacks like (Padding Oracle On Downgraded Legacy Encryption). SSLv3, in particular, was disabled by default in LibreSSL 2.1.1 as an immediate response to the vulnerability disclosed in 2014, which allowed attackers to downgrade connections and exploit padding oracles for data decryption. Full removal of SSLv3 functionality occurred in LibreSSL 2.3.0, alongside the complete excision of SSLv2 code, which had long been deprecated due to weak and negotiation. These changes ensured that LibreSSL implementations could not inadvertently enable vulnerable fallback mechanisms. LibreSSL also eliminated Kerberos authentication support, which was integrated into OpenSSL but posed maintenance challenges and security risks due to its complexity and infrequent use in modern TLS deployments. This removal took place early in the project, during the initial code audit post-fork, as part of broader efforts to strip out rarely used protocol extensions that could introduce subtle vulnerabilities. Similarly, US export-grade ciphers, including 40-bit RC4 variants imposed by historical U.S. export restrictions, were dropped to prevent their accidental enablement in configurations vulnerable to brute-force attacks. These weak ciphers, limited to short key lengths for regulatory compliance in the 1990s, were fully excised in the initial LibreSSL releases to align with contemporary security standards. The self-tests and validation mode were another target for removal, as they were seen to promote insecure practices by restricting users to an approved subset of algorithms that included deprecated options like and single-DES. LibreSSL developers argued that FIPS compliance often led to misguided configurations prioritizing certification over actual security, and thus removed the entire FIPS object module shortly after the . This decision was formalized in 2014, with no plans for reinstatement, freeing the project from the burdens of maintaining government-mandated but cryptographically inferior modes. Finally, code for obsolete platforms, such as pre-2000s architectures like or older variants, was purged to alleviate the overhead of supporting unmaintained . In LibreSSL 4.0.0, developers specifically removed implementations for legacy ciphers on these platforms, focusing resources on modern architectures and reducing the risk of unpatched low-level optimizations becoming attack vectors. This cleanup streamlined the codebase without impacting performance on current systems.

Code Cleanup and Additions

Upon its initial release in April 2014, the LibreSSL project undertook a significant code cleanup effort, removing approximately 90,000 lines of C code from the OpenSSL 1.0.1g codebase in the first week alone. This included eliminating unused code, support for obsolete operating systems such as OS/2 and VMS, and various legacy build configurations, thereby reducing the overall codebase bloat and improving maintainability. Ongoing code audits have continued this process, with subsequent releases incorporating further simplifications, such as cleaning up unused big number (BN) code and refactoring internal structures for efficiency. In addition to removals, LibreSSL has introduced enhancements to support broader usability and robustness. Key additions include improved documentation for and utilities, enhanced error handling mechanisms—such as better and const-correct tables—and new functions like X509_STORE_load_mem for loading certificates from memory. The project also developed portable build scripts tailored for cross-platform compatibility, enabling compilation on systems like , Windows, and macOS while syncing with OpenBSD's upstream changes. LibreSSL has systematically resolved a backlog of bugs inherited from , including fixes for integer overflows in functions like bnrand() and obj_dat.c, which could lead to unintended behaviors. This proactive approach, combined with the reduced codebase scope, has resulted in fewer new (CVEs); a empirical showed LibreSSL with 9 CVEs since its inception, compared to 190 for over a similar period (as of mid-2024). To modernize the library, developers have refactored APIs for greater clarity and consistency, applying styles like Kernel Normal Form (KNF) across files and simplifying internal implementations without breaking compatibility. Portable builds include hints for integrating OpenBSD-style sandboxing mechanisms, such as pledge and unveil, where supported by the host system, to aid secure deployment. These changes contribute to overall code quality, with brief overlaps in enhancements detailed elsewhere.

Adoption and Compatibility

Use in Operating Systems

LibreSSL serves as the default TLS and cryptography library in , where it originated as a of in 2014 to enhance security and code quality within the base system. This integration ensures that core components, such as and other network services, rely on LibreSSL for cryptographic operations, with regular updates synchronized from the source tree. Similarly, adopted LibreSSL as its default cryptographic provider starting in 2016, replacing throughout the base system and planning its complete removal to streamline maintenance and improve security alignment with practices. In Hyperbola GNU/Linux-libre, a lightweight, freedom-focused distribution based on Arch Linux, LibreSSL has been the default SSL/TLS provider since the Milky Way v0.3 release in 2019, supporting the system's emphasis on secure and libre software components. LibreSSL is also available as an optional or ported library in several other systems. For instance, FreeBSD includes it in the ports collection as security/libressl, allowing users to replace OpenSSL in the base system or applications via configuration options like src.conf. In Void Linux, it remains ported and installable via packages, though the distribution switched its default to OpenSSL in 2021 to reduce patching overhead and improve compatibility with upstream software. OPNsense, a FreeBSD-based firewall and routing platform, formerly offered LibreSSL as an optional flavor for enhanced security but deprecated and removed it in version 23.1 (2023) due to maintenance challenges. Portable builds of LibreSSL extend its availability to Linux distributions and Windows, though it is rarely set as the default due to compatibility requirements with the more ubiquitous . On , users can install it through packages in distributions like Gentoo, where it is supported via overlays or ebuilds despite official discontinuation as a in 2021 to avoid ecosystem fragmentation. The libressl-portable project provides pre-built binaries and build scaffolds for Windows environments, including /Server 2008 R2 and later (x86/x64) as well as Wine, enabling integration into applications without native OS support. However, adoption remains limited in these contexts, as many distributions and Windows software ecosystems prioritize for broader interoperability. Several operating systems have discontinued LibreSSL due to compatibility issues. used it as the primary TLS library from 2014 until switching back to in release 3.9.0 (January 2019) to address upstream support gaps and reduce custom patches. In Gentoo, LibreSSL was removed from official stage tarballs and masked in 2021, though community efforts allow continued use for specific setups. These shifts highlight ongoing trade-offs between LibreSSL's security-focused design and the practical demands of wide-scale deployment.

Integration in Projects and Challenges

LibreSSL has seen integration in select software projects, particularly those prioritizing security and lightweight implementations. OpenELEC, a discontinued lightweight Linux distribution for media centers, adopted LibreSSL as its default TLS provider starting with version 5.0 in late 2014, replacing OpenSSL to benefit from improved security and licensing. The curl command-line tool and library supports LibreSSL as a backend for TLS operations, including TLS 1.3 cipher suites since LibreSSL 3.4.1 and curl 8.3.0, enabling secure transfers in environments using LibreSSL. Additionally, OpenBSD's development of LibreSSL has influenced its embedding in Apple's iOS and macOS ecosystems, where it serves as the compatibility layer for OpenSSL binaries and tools. Despite these integrations, LibreSSL encounters significant challenges in project adoption due to API and ABI incompatibilities with . For instance, differences in function signatures, such as changes to const qualifiers in older interfaces, can cause compilation failures when projects expect full OpenSSL 1.0.1 compatibility. Cryptographic operations like encryption may produce incompatible outputs between LibreSSL and due to variations in default key derivation algorithms, requiring custom patches for . LibreSSL's deliberate removal of certain deprecated or insecure features further exacerbates these issues, leading to missing symbols and errors in codebases. The library's smaller , with fewer third-party wrappers and tools optimized for it compared to or BoringSSL, limits seamless integration in diverse projects. Broader adoption barriers persist, particularly in mainstream Linux environments. Distributions like and have refrained from defaulting to LibreSSL owing to the substantial testing overhead required to ensure compatibility across their vast package ecosystems, favoring the more ubiquitous instead. A notable example is , which discontinued LibreSSL support in version 3.10 released in 2021 to streamline maintenance and prioritize standardization, reflecting resource constraints in supporting multiple TLS backends. In niche, security-focused projects, however, LibreSSL remains advantageous due to its comparatively smaller history of (CVEs)—with fewer high-severity issues reported than in —and enhanced auditability from a streamlined, modernized . This makes it suitable for environments demanding rigorous and minimal , such as systems or high-security applications.

References

  1. [1]
    LibreSSL
    LibreSSL is a version of the TLS/crypto stack forked from OpenSSL in 2014, with goals of modernizing the codebase, improving security, and applying best ...Releases · Goals · Presentations and Papers · Mailing Lists
  2. [2]
    origins of libressl
    ### Summary of LibreSSL Origins
  3. [3]
    OpenSSL code beyond repair, claims creator of “LibreSSL” fork
    Apr 22, 2014 · OpenBSD founder Theo de Raadt has created a fork of OpenSSL, the widely used open source cryptographic software library that contained the notorious Heartbleed ...Missing: history | Show results with:history
  4. [4]
    Goals - LibreSSL
    LibreSSL Goals. Modernize the OpenSSL codebase to make it easier to audit, understand and repair. Apply best-practice development processes:.Missing: website | Show results with:website
  5. [5]
  6. [6]
    LibreSSL/History - FreeBSD Wiki
    The success of this is reflected in the fact that LibreSSL was not vulnerable to the two memory leak issues released on "OpenSSL Tuesday" - They were in fact ...
  7. [7]
    Releases - LibreSSL
    The LibreSSL project tracks OpenBSD development. Stable releases are derived from the most recent OpenBSD release, plus security updates as necessary.
  8. [8]
    The OpenBSD Foundation
    The Foundation uses all funds it receives to fund infrastructure costs for the projects, and developer events and initiatives - typically these are OpenBSD ...Donations · Our Bylaws · Membership · Activities
  9. [9]
    LibreSSL languishes on Linux - LWN.net
    Jan 4, 2021 · The LibreSSL project has been developing a fork of the OpenSSL package since 2014; it is supported as part of OpenBSD. Adoption of LibreSSL ...<|control11|><|separator|>
  10. [10]
    OpenBSD 7.8
    Oct 22, 2025 · LibreSSL version 4.2.0: Portable changes: Added explicit OpenBSD/ISC license to build system / scripts. Fixed compilation on more CPU ...
  11. [11]
    libressl/portable - GitHub
    LibreSSL is a fork of OpenSSL 1.0.1g developed by the OpenBSD project. Our goal is to modernize the codebase, improve security, and apply best practice ...Missing: lightweight embedded
  12. [12]
    Donate to the OpenBSD Foundation
    The Foundation has requested funding from the Linux Foundation's Core Infrastructure Initiative to support accelerated development of LibreSSL. 2013. During ...
  13. [13]
    Index of /pub/OpenBSD/LibreSSL/
    ### Summary of Removals in LibreSSL Release Notes
  14. [14]
    Innovations - OpenBSD
    LibreSSL: Started by Ted Unangst, Bob Beck, Joel Sing, Miod Vallat, Philip Guenther, and Theo de Raadt on April 13, 2014, as a fork of OpenSSL 1.0.1g. First ...
  15. [15]
    OpenSSL 'Heartbleed' vulnerability (CVE-2014-0160) | CISA
    Oct 5, 2016 · This flaw allows an attacker to retrieve private memory of an application that uses the vulnerable OpenSSL library in chunks of 64k at a time.
  16. [16]
    [PDF] Better documentation - OpenBSD
    May 26, 2018 · Document the inscrutable: LibreSSL and API design. 4. Other progress with mandoc in 2016-2018: • Why we deleted SQLite from the OpenBSD base ...
  17. [17]
    OpenBSD forks, prunes, fixes OpenSSL - ZDNET
    The main effort of the LibreSSL project is to remove the very large portion of the code that serves purposes that are either of very limited ...
  18. [18]
    LibreSSL crypto library leaps from OpenBSD to Linux, OS X, more
    Jul 12, 2014 · The OpenBSD project has released the first portable version of LibreSSL, the team's OpenSSL fork – meaning it can be built for operating systems other than ...Missing: announcement | Show results with:announcement
  19. [19]
    OpenBSD 5.6 Replaces OpenSSL with LibreSSL - ZDNET
    Nov 4, 2014 · LibreSSL has several goals, including API compatibility with OpenSSL and simplification through the removal of features considered off-mission.
  20. [20]
    LibreSSL 3.0.0 Released - BSDSec
    Aug 5, 2019 · We have released LibreSSL 3.0.0, which will be arriving in the LibreSSL directory of your local OpenBSD mirror soon.
  21. [21]
  22. [22]
    LibreSSL 3.7.2 Released - OpenBSD Journal
    Apr 8, 2023 · This is the first stable release for the 3.7.x branch, also available with OpenBSD 7.3 It includes the following changes from the 3.6.x series ...
  23. [23]
    A Survey of Post-Quantum Cryptography Support in Cryptographic ...
    Aug 22, 2025 · This study evaluates the support for PQC algorithms within nine widely used open-source cryptographic libraries -- OpenSSL, wolfSSL, BoringSSL, ...
  24. [24]
    LibreSSL: The Secure OpenSSL Alternative - Infosec Institute
    Oct 21, 2015 · LibreSSL is designed to be a drop-in replacement of OpenSSL. Its stated goals are code modernization, security and software development best practice.
  25. [25]
    The libressl Open Source Project on Open Hub
    Project Summary. LibreSSL is a FREE version of the SSL/TLS protocol forked from OpenSSL. Tags. aes authentication c cryptography des encryption library ...
  26. [26]
    Adding Q-safe preference to OpenSSL TLSv1.3 - IBM Research
    Apr 15, 2025 · The OpenSSL code base also consists of more than 500,000 lines of code, with around 70,000 of them devoted to TLS alone. Any changes must be ...<|control11|><|separator|>
  27. [27]
    The State of SSL Stacks - HAProxy Technologies
    May 6, 2025 · The SSL landscape has shifted dramatically. In this paper, we examine OpenSSL 3.x, BoringSSL, LibreSSL, WolfSSL, and AWS-LC with HAProxy.
  28. [28]
    libressl-OPENSSL_malloc(3) - Arch manual pages
    These functions are wrappers around the corresponding standard malloc(3), free(3), and strdup(3) functions. The OPENSSL_* () functions are implemented as ...Missing: changes | Show results with:changes
  29. [29]
    [Openvpn-devel,1/2] Github Actions: Add libreSSL actions - Patchwork
    ... [libressl] + build: [ normal, asan ] + configureflags: ["--with-openssl-engine=no"] + include: + - build: asan + cflags: "-fsanitize=address -fno-optimize ...
  30. [30]
    LibreSSL: ChangeLog - Fossies
    1 Because this project is maintained both in the OpenBSD tree using CVS and in 2 Git, it can be confusing following all of the changes.
  31. [31]
    LibreSSL - freshcode.club
    LibreSSL Portable is a free version of the SSL/TLS protocol forked from OpenSSL, and developed by the OpenBSD project.
  32. [32]
    Chacha20_Poly1305 - Server - Let's Encrypt Community Support
    Jan 27, 2016 · @ecdsa-chacha20 LibreSSL 2.3.2 is official out now ... 0 also adds ChaCha20-Poly1305 support (among support for x25519 and such stuff).
  33. [33]
    Changelog for LibreSSL 2.6.5 - ABI laboratory
    * Implemented the IETF ChaCha20-Poly1305 cipher suites. * Changed default EVP_aead_chacha20_poly1305() implementation to the IETF version, which is now the ...
  34. [34]
    AES-NI SSL Performance Study @ Calomel.org
    Jul 1, 2024 · AES-NI increases efficiency for SSL, using real CPU cores. A CPU needs 1250 MB/s per core. OpenSSL is faster than LibreSSL with AES-NI.
  35. [35]
    RFC 9155: Deprecating MD5 and SHA-1 Signature Hashes in TLS ...
    RFC 9155 deprecates MD5 and SHA-1 for TLS 1.2 and DTLS 1.2 digital signatures due to vulnerability, but not for SHA-1 with HMAC.Missing: LibreSSL | Show results with:LibreSSL
  36. [36]
  37. [37]
    A Survey of Post-Quantum Cryptography Support in Cryptographic ...
    Aug 22, 2025 · LibreSSL is an OpenSSL-derived library maintained by the OpenBSD project that focuses on simplicity and security. As of 2025, LibreSSL does ...
  38. [38]
    LibreSSL: More Than 30 Days Later - OpenBSD
    LibreSSL: More Than 30 Days Later. Ted Unangst. tedu ... Especially regarding handling of wildcard certificates and everybody's favorite, embedded nul bytes.
  39. [39]
  40. [40]
  41. [41]
  42. [42]
    OpenBSD has started a massive strip-down and cleanup of OpenSSL
    ### Summary of LibreSSL Initial Cleanup and Code Removal
  43. [43]
  44. [44]
  45. [45]
    Releases · libressl/portable - GitHub
    Oct 14, 2024 · LibreSSL Portable itself. This includes the build scaffold and compatibility layer that builds portable LibreSSL from the OpenBSD source ...Missing: lightweight embedded
  46. [46]
    LibreSSL 4.0.0 Released - BSDSec
    Oct 15, 2024 · * Internal improvements - Cleaned up parts of the conf directory. Simplified some logic, fixed memory leaks. - Simplified X509_check_trust() ...Missing: elimination | Show results with:elimination
  47. [47]
    An Empirical Analysis of Vulnerabilities in Cryptographic Libraries
    Jul 5, 2024 · Lines of Code: We use the command-line tool cloc [67] to count the total lines of code for each language in a codebase. Throughout our study ...
  48. [48]
    [PDF] Pledge, and Unveil, in OpenBSD
    Jun 8, 2018 · Pledge takes syscalls away – but not filesystem access – it could still go after my ssh keys. Page 7. Unveiling Unveil. ○ Limit filesystem ...
  49. [49]
    [PDF] Recent Progress in and around LibreSSL | OpenBSD
    Sep 17, 2022 · LibreSSL Main Features. ▷ libtls: sane and easy-to-use wrapper of ... ▷ May 2021: QUIC standardized in RFCs 9000 – 9002. ▷ Sep 2021 ...
  50. [50]
    DragonFlyBSD Continues LibreSSL Push, OpenSSL To Be Dropped ...
    DragonFlyBSD is now defaulting to LibreSSL throughout its operating system stack and is planning to completely remove OpenSSL in the near future.
  51. [51]
  52. [52]
    News: Milky Way v0.3 release - Hyperbola
    Sep 23, 2019 · It includes Xenocara as the default display server for the X Window System and LibreSSL as the default provider of SSL and TLS protocols.
  53. [53]
    LibreSSL - FreeBSD Wiki
    May 15, 2022 · You can use LibreSSL with all of your ports, or to replace OpenSSL in base. After switching the OpenSSL provider you MUST rebuild all ports.Missing: purpose | Show results with:purpose
  54. [54]
    Switching back to OpenSSL - Void Linux
    Feb 23, 2021 · Because most software targets OpenSSL, Void will no longer have to maintain (in some cases, very complex) patches to support LibreSSL.
  55. [55]
    OPNsense Release Information - Thomas-Krenn-Wiki-en
    Jul 23, 2025 · With 23.1, LibreSSL has been removed. You must switch back to OpenSSL to upgrade to 23.1 if you previously used LibreSSL. OPNsense 22.7, FreeBSD ...
  56. [56]
    LibreSSL - Gentoo Wiki
    May 14, 2022 · LibreSSL is a fork of, and drop-in replacement for OpenSSL. It was originally a response to the infamous heartbleed vulnerability.
  57. [57]
    LibreSSL support discontinued - Gentoo Linux
    Starting 2021-02-01, Gentoo will discontinue supporting dev-libs/libressl as an alternative to dev-libs/openssl.
  58. [58]
    LibreSSL Usage & Deployment - IANIX
    Dec 21, 2023 · Here's a list of operating systems and Linux distros that have adopted LibreSSL, OpenBSD's fork of OpenSSL. Various software projects ...Missing: early | Show results with:early
  59. [59]
    SSL ciphers - curl
    Setting TLS 1.3 cipher suites is supported by curl with OpenSSL (1.1.1+, curl 7.61.0+), LibreSSL (3.4.1+, curl 8.3.0+), wolfSSL (curl 8.10.0+) and ...
  60. [60]
    Incompatibility with OpenSSL 1.0.1g interface · Issue #573 - GitHub
    Mar 16, 2020 · LibreSSL tries to be compatible with OpenSSL where possible and is largely compatible with 1.0.1 and newer versions - the const changed ...
  61. [61]
    LibreSSL aes encryption incompatible with OpenSSL? - Super User
    Oct 2, 2021 · Apparently, in a later version of OpenSSL (later LibreSSL) the default hashing algorithm for key derivation was changed from md5 to sha256.
  62. [62]
    How to replace OpenSSL with LibreSSL globally?
    Oct 29, 2022 · Compatibility with OpenSSL: LibreSSL is API compatible with OpenSSL 1.0.1, but does not yet include all new APIs from OpenSSL 1.0.2 and later.
  63. [63]
    LibreSSL languishes on Linux - LWN.net
    Jan 4, 2021 · The same PEP also proposes to remove LibreSSL support from upstream CPython. Python core development doesn't have resources to support LibreSSL.Missing: discontinued | Show results with:discontinued
  64. [64]
    Libressl from openssl - Fedora Discussion
    Oct 29, 2022 · If you switch to libressl you will be switching away from a package that is supported in fedora and may cause yourself other related issues, ...Missing: adoption barriers Ubuntu
  65. [65]
    Openbsd Libressl security vulnerabilities, CVEs, versions and CVE ...
    This page lists vulnerability statistics for all versions of Openbsd Libressl. Vulnerability statistics provide a quick overview for security vulnerabilities ...Missing: history focused projects