30 December 2025
Feisty Duck’s Cryptography & Security Newsletter is a periodic dispatch bringing you commentary and news surrounding cryptography, security, privacy, SSL/TLS, and PKI. It's designed to keep you informed about the latest developments in this space. Enjoyed every month by more than 50,000 subscribers. Written by Ivan Ristić.
Free CT and certificate expiry monitoring from Red Sift. Avoid downtime and security risks with monitoring provided by Red Sift Certificates Lite. Monitors Certificate Transparency as well as your installed certificates. Track up to 250 certificates for free. Recommended by Let’s Encrypt.
A lot changed when OpenSSL 3 was first released. This version was supposed to bring significant improvements and modernize the project after nearly thirty years of development. Instead, it introduced significant performance regressions, essentially breaking the project for any high-volume deployment. It didn’t help that the previous stable version, the 1.1.1 branch, had been promptly deprecated.
For a very long time, this was not something that was talked about. There were issues on the OpenSSL tracker, but only those who experienced these performance issues would find them. Eventually, the HAProxy developers wrote an extensive article on the state of SSL libraries in general and OpenSSL in particular. The message was clear: Stay away from OpenSSL 3.x if you care about performance.
This year, at the inaugural OpenSSL Conference, several talks provided more background information about the performance regressions and other changes in the 3.x branch:
If you have an interest in OpenSSL, these three presentations will be well worth your time. Overall, it seems that, after four years of improvements, OpenSSL 3.5.x is in relatively reasonable shape and (finally) comparable to the performance of the now-ancient 1.1.1 branch. Many opportunities for performance improvements still exist, however.
It’s good to know that OpenSSL 3.5.x has gotten better—because there is currently a major shift to post-quantum cryptography, and the popular Linux distributions have chosen 3.5.x as the version to use for that. Examples include Debian 13 Trixie (released in August 2025), Red Hat Enterprise Linux 10.1 (released in November 2025), and Ubuntu 26.04 LTS (to be released in April 2026). Post-quantum cryptography is already going to perform worse; we don’t need to make it slower than it needs to be.
This subscription is just for the newsletter; we won't send you anything else.
Designed by Ivan Ristić, the author of SSL Labs, Bulletproof TLS and PKI, and Hardenize, our course covers everything you need to know to deploy secure servers and encrypted web applications.
Remote and trainer-led, with small classes and a choice of timezones.
Join over 2,000 students who have benefited from more than a decade of deep TLS and PKI expertise.