wolfSSL Embedded SSL/TLS Library | Products – wolfSSL

Reading more into it now before trying...
Sort of does same thing except no support for TLS 1.3 where wolfssl does...mbedtls?
Sort of does same thing except no support for TLS 1.3 where wolfssl does...
????mbedtls does not support TLS 1.3? That would be surprising.
But anyway, what is the issue with OpenSSL?
????
I don't have an 'issue' with anything.....
Smaller footprint less resources is why I was looking at it, cant be a bad thing. You're right, I'm wrong about mbed. Was looking at a few comparisons between the two and that was mentioned. Didn't realize it was an older comparison. So thanks for that.
...I am surprised that someone can live without OpenSSL, but okay.
...
On my other systems I have it.
On my leopard install, something that doesn't take up resources makes sense to me....
Idk why.
I sense sarcasm.
I can live without a lot of things.
Sarcasm is one of them.
If you have a problem with me posting on here let me know.
I've been on enough forums to know that vibe.
Matter of fact.
You can message me.
Unless you want to keep it public....
Thanks for your time
Looks like this "might" work on all platforms supported by LWK...wolfSSL Embedded SSL/TLS Library | Products – wolfSSL
www.wolfssl.com
Reading more into it now before trying...
After being unable to find a solution which doesn't rely on having a second machine, I made my own basic proxy program for PowerPC OS X.
My program uses OpenSSL 1.1.1w to upgrade Webkit and other TLS/SSL connections to TLS 1.2/1.3, as needed. While I have only tested it with HTTPS with Leopard-Webkit, it presumably could work for other protocols and programs.
To set-up the program:
(a) download aproxy-0.0.1.zip
(b) unzip the program on your Desktop
(c) configure your Mac / Leopard-Webkit to use localhost:8080 for HTTPS proxy
(d) open a Terminal, go to the folder where you unzipped the files, and run ./aproxy
When you run the program for the first time (and whenever proxy-ca.pem expires), the program will generate a temporary CA root certificate that it will use. The certificate is set to expire every 90 days. The certificate generated will be stored in the file proxy-ca.pem, with the private key stored in proxy-key.pem.
The program will open Keychain Access and prompt you to add it as a trusted certificate.
However, if you prefer, you could also generate your own CA X509 certificates and import them manually, instead.
Note: If you don't add the CA certificate as a trusted root, you can still use the proxy, but Safari will prompt you multiple times to accept certificates and there will be some errors on webpages (most often images will loading).
Let me know if you have any questions.
The main potential bug to be aware of is that very occasionally you may have to refresh a page if it doesn't load (however, this may be fixed as I was previously using a).
There is also a limitation that the proxy will fail to handle extremely large "CONNECT" proxy request headers > 16kb. I haven't encountered this as a problem to date and don't expect it to be an issue with Leopard-Webkit / HTTPS. Nonetheless, this is something to keep in mind when testing the program with other protocols like IMAP, etc.
Security features:
(a) the program will fail to load any website or component of it, if the X509 certificate of the server its connecint to doesn't verify using proxy-roots.pem (the root certificate store obtained from Curl). The program will also print out an error message to the Terminal whenever such an event occurs.
(b) the program does not accept inbound connections from other machines - i.e. you should not be able to connect to port 8080 from another machine on your network.
(c) the program provides a reasonably detailed log of error messages, which can be saved and used for debugging, including the certificate information for any outbound connection it makes.
Let me know if you encounter any bugs or have some features you would like to suggest.
The program is provided as-is, freeware for personal use.
P.S. I don't have Patreon, but would greatly appreciate donations of working PowerPC Mac hardware and software.
(Next project - Leopard-Webkit)
G4 Cube 450 MHz OS X 10.4 (would love to upgrade to a Sonnet 1.8 GHz one day)
G5 DP 2.0 GHz OS X 10.5 (for compiling and Leopard-Webkit)
After being unable to find a solution which doesn't rely on having a second machine, I made my own basic proxy program for PowerPC OS X.
My program uses OpenSSL 1.1.1w to upgrade Webkit and other TLS/SSL connections to TLS 1.2/1.3, as needed. While I have only tested it with HTTPS with Leopard-Webkit, it presumably could work for other protocols and programs.
To set-up the program:
(a) download aproxy-0.0.1.zip
(b) unzip the program on your Desktop
(c) configure your Mac / Leopard-Webkit to use localhost:8080 for HTTPS proxy
(d) open a Terminal, go to the folder where you unzipped the files, and run ./aproxy
When you run the program for the first time (and whenever proxy-ca.pem expires), the program will generate a temporary CA root certificate that it will use. The certificate is set to expire every 90 days. The certificate generated will be stored in the file proxy-ca.pem, with the private key stored in proxy-key.pem.
The program will open Keychain Access and prompt you to add it as a trusted certificate.
However, if you prefer, you could also generate your own CA X509 certificates and import them manually, instead.
Note: If you don't add the CA certificate as a trusted root, you can still use the proxy, but Safari will prompt you multiple times to accept certificates and there will be some errors on webpages (most often images will loading).
Let me know if you have any questions.
The main potential bug to be aware of is that very occasionally you may have to refresh a page if it doesn't load (however, this may be fixed as I was previously using a).
There is also a limitation that the proxy will fail to handle extremely large "CONNECT" proxy request headers > 16kb. I haven't encountered this as a problem to date and don't expect it to be an issue with Leopard-Webkit / HTTPS. Nonetheless, this is something to keep in mind when testing the program with other protocols like IMAP, etc.
Security features:
(a) the program will fail to load any website or component of it, if the X509 certificate of the server its connecint to doesn't verify using proxy-roots.pem (the root certificate store obtained from Curl). The program will also print out an error message to the Terminal whenever such an event occurs.
(b) the program does not accept inbound connections from other machines - i.e. you should not be able to connect to port 8080 from another machine on your network.
(c) the program provides a reasonably detailed log of error messages, which can be saved and used for debugging, including the certificate information for any outbound connection it makes.
Let me know if you encounter any bugs or have some features you would like to suggest.
The program is provided as-is, freeware for personal use.
P.S. I don't have Patreon, but would greatly appreciate donations of working PowerPC Mac hardware and software.
(Next project - Leopard-Webkit)
G4 Cube 450 MHz OS X 10.4 (would love to upgrade to a Sonnet 1.8 GHz one day)
G5 DP 2.0 GHz OS X 10.5 (for compiling and Leopard-Webkit)
Thank you for letting me know, I think I can see what's causing that bug.@GA204 Running aproxy generates the certificate but LWK won't connect. Running aproxy again gives the attached error.
View attachment 2459974
Thanks. Fortunately, I was able to get some good results with some preliminary optimization work and now it is averaging about 5-8% CPU on my DP 2.0 Ghz PowerMac G5 when loading webpages and 0.0% when idling. Attached is a copy.@GA2045
Thanks - that appears to work now. Alas, on my Powerbook it's using up to 80% CPU so not really practical on that level of hardware. Well done on making it work and good luck with any other projects.
This has worked very well on my machines running 10.5 - many thanks again! Any chance of your code building on 10.4 to upgrade Safari (4.0.3 plus TigerKit available) to TLS 1.3?
Cool! Is there a particular reason you are expiring the certificate after 90 days? I'm not seeing an obvious security benefit, since it's a generated certificate that is only used locally. You should be able to generate a certificate that lasts for hundreds of years via something like:After being unable to find a solution which doesn't rely on having a second machine, I made my own basic proxy program for PowerPC OS X.
openssl req -x509 -newkey rsa:4096 -subj '/CN=Squid' -nodes -days 800000 -keyout squid-key.pem -out squid.pem