ql-https VS quicklisp-client

Compare ql-https vs quicklisp-client and see what are their differences.

Our great sponsors
  • WorkOS - The modern identity platform for B2B SaaS
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • SaaSHub - Software Alternatives and Reviews
ql-https quicklisp-client
6 6
16 286
- -
7.7 0.0
about 2 months ago 7 days ago
Common Lisp Common Lisp
MIT License MIT License
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

ql-https

Posts with mentions or reviews of ql-https. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-07-26.
  • It's 2023, so of course I'm learning Common Lisp
    11 projects | news.ycombinator.com | 26 Jul 2023
    Solutions for the lack of https:

    - add in https://github.com/rudolfochrist/ql-https (downloads packages with curl)

    - use another package manager, CLPM: https://www.clpm.dev (or the newest ocicl)

    > CLPM comes as a pre-built binary, supports HTTPS by default, supports installing multiple package versions, supports versioned systems, and more.

    - use mitmproxy: https://hiphish.github.io/blog/2022/03/19/securing-quicklisp...

  • Ocicl – An ASDF system distribution and management tool for Common Lisp
    8 projects | news.ycombinator.com | 17 May 2023
    Other options are:

    - Quicklisp -really slick, libraries in there are curated. (with https support here: https://github.com/rudolfochrist/ql-https and here: https://github.com/snmsts/quicklisp-https.git)

    - for project-local dependencies like virtualenv: https://github.com/fukamachi/qlot

    - a new, more traditional one: https://www.clpm.dev (CLPM comes as a pre-built binary, supports HTTPS by default, supports installing multiple package versions, supports versioned systems, and more)

    For recent Quicklisp upgrades: http://ultralisp.org/

    Ocicl is very new (5 days) and tries a new approach, building "on tools from the world of containers".

  • What do you think the risks/pitfalls of using Common Lisp are in a business?
    1 project | /r/lisp | 11 May 2023
    You can use SSL with QuickLisp via ql-https
  • quicklisp security (or total lack of it)
    6 projects | /r/lisp | 26 Feb 2023
  • Common Lisp Implementations in 2023
    10 projects | news.ycombinator.com | 23 Feb 2023
    LPM's warning is not surprising. It's common for libraries (dare I say open-source ones?), even if they work well. It's part of the stability game, once they are marked 1.0, they are stable. LPM works well (as reported by others).

    QL wants to do it portably, there are easy workarounds, but yeah…

    (just saw https://github.com/rudolfochrist/ql-https)

  • Securing Quicklisp through mitmproxy
    2 projects | /r/Common_Lisp | 19 Mar 2022
    That what I‘m doing: https://github.com/rudolfochrist/ql-https

quicklisp-client

Posts with mentions or reviews of quicklisp-client. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-06-30.
  • Steel Bank Common Lisp
    9 projects | news.ycombinator.com | 30 Jun 2023
    Yes, that's clear.

    I'm not very familiar with how quicklisp works. I thought that “updates once a month” implies a separate update channel (distribution, ...).

    Looking at the relevant issue, https://github.com/quicklisp/quicklisp-client/issues/167 , it's not clear that even hashes are in place.

    I recently found out that most Nix fetchers use https, but do not actually do verification (`curl --insecure` or equivalent libcurl settings). Channel updates do verify and include hashes, so the overall chain is authenticated.

  • quicklisp security (or total lack of it)
    6 projects | /r/lisp | 26 Feb 2023
    The latest comment I see about this here from Oct. 2022 says they're working on it. There's also comment by the developer in 2016 saying want to improve the security soon, so it doesn't really seem this will actually happen soon. I realise making signature verification work cross platform in pure lisp without external dependencies isn't easy but from latest comment it seems they have that working, in a branch written 4 years ago? The simplest no-code solution is just since quicklisp is published every month or so, on each new update publish a file with sha256 hash of every package contained in quicklisp signed with same developer's pgp key they are already using to sign download of the initial quicklisp.lisp, yes then users if they care about security would have to manually download the file and verify signature every month or so but it's at least some solution that can be done now.
  • Common Lisp Implementations in 2023
    10 projects | news.ycombinator.com | 23 Feb 2023
    > That's what regular devs do, they don't even bother writing articles or commenting on HN :-)

    I'll take the bait, and roll up several of my comments into one.

    First, the support contract costs from the commercial vendors can make sense. It's one of the most expensive parts of software. We joke about fixing relatives' printers, but its not false. Support costs introduce a counter-balance.

    Second, a message to everyone looking into or using QuickLisp, it uses http instead of https: https://github.com/quicklisp/quicklisp-client/issues/167

    You can patch your version to fix this. I'd also recommend adding firewall rules to deny in case your patches roll back. And any other mitigation. Or stricter policies, such as not using it, if it makes sense for your organization.

    And the AI bots? I hope there aren't people herding them who don't want to, that's how you get unloving brats and a crappy world.

  • Securing Quicklisp through mitmproxy
    2 projects | /r/Common_Lisp | 19 Mar 2022
    I found this github issue about it, open since 2018: https://github.com/quicklisp/quicklisp-client/issues/167
  • Why do people use Quicklisp although it is known to be vulnerable to man-in-the-middle attacks?
    5 projects | /r/lisp | 30 Jan 2021
    I agree 100% about needing to test and audit for security. But based on the information I've seen and public activity in repos, I assumed Xach was going for home-grown CL implementation. https://github.com/quicklisp/quicklisp-client/blob/pgp/quicklisp/openpgp.lisp

What are some alternatives?

When comparing ql-https and quicklisp-client you can also consider the following projects:

CSharpRepl - A command line C# REPL with syntax highlighting – explore the language, libraries and nuget packages interactively.

CIEL - CIEL Is an Extended Lisp. Scripting with batteries included.

tungsten - A Common Lisp toolkit.

cerberus - Common Lisp Kerberos v5 implementation

bettercap - The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.

BDFProxy - Patch Binaries via MITM: BackdoorFactory + mitmProxy.

alive - Common Lisp Extension for VSCode

ocicl - An OCI-based ASDF system distribution and management tool for Common Lisp

thirteen-letters - Competitive word scramble in the browser, made for Lisp Game Jam (Spring 2023)

aserve - AllegroServe, a web server written in Common Lisp

quicklisp-https