s2n VS quiche

Compare s2n vs quiche and see what are their differences.

s2n

An implementation of the TLS/SSL protocols (by awslabs)

quiche

🥧 Savoury implementation of the QUIC transport protocol and HTTP/3 (by cloudflare)
Our great sponsors
  • WorkOS - The modern identity platform for B2B SaaS
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • SaaSHub - Software Alternatives and Reviews
s2n quiche
9 26
4,446 8,888
0.3% 2.7%
9.4 9.0
6 days ago 7 days ago
C Rust
Apache License 2.0 BSD 2-clause "Simplified" License
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

s2n

Posts with mentions or reviews of s2n. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-12-03.
  • S2n-TLS – A C99 implementation of the TLS/SSL protocol
    1 project | /r/programming | 5 Dec 2023
    4 projects | news.ycombinator.com | 3 Dec 2023
    It seems to support multiple options but requires you pick at least one of them. https://github.com/aws/s2n-tls/blob/main/docs/BUILD.md#build...
  • OpenSSL 1.1.1 End of Life
    3 projects | news.ycombinator.com | 11 Sep 2023
    I think GnuTLS is probably the second most popular TLS library, after openssl.

    I'll also mentions s2n and rustls-ffi for completeness as C libraries, though the former isn't widely used, and the latter is very experimental still. https://github.com/aws/s2n-tls and https://github.com/rustls/rustls-ffi respectively.

  • I want XAES-256-GCM/11
    2 projects | news.ycombinator.com | 6 Jul 2023
    I've seen operating on unauthenticated plaintext enough times to list it as my own pet peeve with AES-GCM. But it's a problem for chunked messages too. A few years ago we released a SCRAM mode that makes very minimal changes to AES-GCM so that it mathematically can't operate on unauthenticated plaintext. https://github.com/aws/s2n-tls/tree/main/scram
  • Golang is evil on shitty networks
    21 projects | news.ycombinator.com | 29 Dec 2022
    > The documentation is kind of vague, but apparently you have to re-enable it regularly.[3]

    This is correct. And in the end it means more or less that setting the socket option is more of a way of sending an explicit ACK from userspace than a real setting.

    It's not great for common use-cases, because making userspace care about ACKs will obviously degrade efficiency (more syscalls).

    However it can make sense for some use-cases. E.g. I saw the s2n TLS library using QUICKACK to avoid the TLS handshake being stuck [1]. Maybe also worthwhile to be set in some specific RPC scenarios where the server might not immediately send a response on receiving the request, and where the client could send additional frames (e.g. gRPC client side streaming, or in pipelined HTTP requests if the server would really process those in parallel and not just let them sit in socket buffers).

    [1] https://github.com/aws/s2n-tls/blob/46c47a71e637cabc312ce843...

  • S2n-QUIC (Rust implementation of QUIC)
    6 projects | news.ycombinator.com | 17 Feb 2022
    It looks like by default s2n-quic uses this TLS implementation, which is not based on the ring crate (though it is written in C)

    https://github.com/aws/s2n-tls

  • LibreSSL Languishes on Linux
    5 projects | news.ycombinator.com | 4 Jan 2021
    I would be interested in the other SSL implementations:

    - https://github.com/awslabs/s2n

    - https://boringssl.googlesource.com/boringssl

    - https://bearssl.org/

    Are these subpar implementations or there are other reasons not to use these?

quiche

Posts with mentions or reviews of quiche. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-10-21.
  • Nghttp3 1.0.0 – HTTP/3 library written in C
    7 projects | news.ycombinator.com | 21 Oct 2023
    The title of this post puts emphasis on "written in C", making me wonder when this would ever be a desirable feature, given that more secure implementations are available, and can be integrated into old C projects just as easily.

    No need to rewrite everything from the ground up: https://github.com/cloudflare/quiche#curl

  • Curl HTTP/3 with quiche discouraged
    2 projects | news.ycombinator.com | 22 Mar 2023
    The issue is dead silent too!

    https://github.com/cloudflare/quiche/issues/1115

  • Best performing quic implementation?
    4 projects | /r/rust | 5 Mar 2023
  • Oxy is Cloudflare's Rust-based next generation proxy framework
    5 projects | /r/rust | 2 Mar 2023
    Even though Oxy is a proprietary project, we try to give back some love to the open-source community without which the project wouldn’t be possible by open-sourcing some of the building blocks such as https://github.com/cloudflare/boring and https://github.com/cloudflare/quiche.
  • How Rust and Wasm power Cloudflare's 1.1.1.1
    3 projects | /r/rust | 28 Feb 2023
    They’ve been on the Rust train since at least 2019. Just look at projects like quiche, wrangler, and boringtun
  • What is a CDN? How do CDNs work?
    3 projects | news.ycombinator.com | 8 Feb 2023
    It's more like Cloudflare forked nginx a long time ago, and is meanwhile in the very slow (like, decade-long) process of replacing it entirely.

    The Cloudflare Workers Runtime, for instance, is built directly around V8; it does not use nginx or any other existing web server stack. Many new features of Cloudflare are in turn built on Workers, and much of the old stack build on nginx is gradually being migrated to Workers. https://workers.dev https://github.com/cloudflare/workerd

    In another part of the stack, there is Pingora, another built-from-scratch web server focused on high-performance proxying and caching: https://blog.cloudflare.com/how-we-built-pingora-the-proxy-t...

    Even when using nginx, Cloudflare has rewritten or added big chunks of code, such as implementing HTTP/3: https://github.com/cloudflare/quiche And of course there is a ton of business logic written in Lua on top of that nginx base.

    Though arguably, Cloudflare's biggest piece of magic is the layer 3 network. It's so magical that people don't even think about it, it just works. Seamlessly balancing traffic across hundreds of locations without even varying IP addresses is, well, not easy.

    I could go on... automatic SSL provisioning? DDoS protection? etc. These aren't nginx features.

    So while Cloudflare may have gotten started being more-or-less nginx-as-a-service I don't think you can really call it that anymore.

    (I'm the tech lead for Cloudflare Workers.)

  • Using WebTransport
    6 projects | news.ycombinator.com | 16 Sep 2022
  • Is it better to learn web development with Python or C?
    4 projects | /r/webdev | 7 Aug 2022
    Ask Cloudflare why they use HTTP/3 and QUIC https://github.com/cloudflare/quiche.
  • DNS-over-HTTP/3 in Android
    1 project | news.ycombinator.com | 20 Jul 2022
  • The MQTT broker powering Cloudflare's new Pub/Sub product is written in Rust!
    1 project | /r/rust | 12 May 2022
    Cloudflare has used rust for multiple projects in the past such as their QUIC/HTTP3 implementation Quiche and a WireGuard implementation BoringTun.

What are some alternatives?

When comparing s2n and quiche you can also consider the following projects:

OpenSSL - TLS/SSL and crypto library

quinn - Async-friendly QUIC implementation in Rust

mbedTLS - An open source, portable, easy to use, readable and flexible TLS library, and reference implementation of the PSA Cryptography API. Releases are on a varying cadence, typically around 3 - 6 months between releases.

msquic - Cross-platform, C implementation of the IETF QUIC protocol, exposed to C, C++, C# and Rust.

LibTomCrypt - LibTomCrypt is a fairly comprehensive, modular and portable cryptographic toolkit that provides developers with a vast array of well known published block ciphers, one-way hash functions, chaining modes, pseudo-random number generators, public key cryptography and a plethora of other routines.

quic-go - A QUIC implementation in pure Go

LibreSSL - LibreSSL Portable itself. This includes the build scaffold and compatibility layer that builds portable LibreSSL from the OpenBSD source code. Pull requests or patches sent to [email protected] are welcome.

shadowsocks-rust - A Rust port of shadowsocks

libsodium - A modern, portable, easy to use crypto library.

neqo - Neqo, an implementation of QUIC in Rust

Botan - Cryptography Toolkit

s2n-quic - An implementation of the IETF QUIC protocol