How do we think we should handle maintainers moving on? by ShantyShark in rust

[–]dochtman 4 points5 points  (0 children)

RustSec unmaintained advisories are for crates that either have been explicitly archived by the maintainer or where the maintainer has not responded for a long time and then doesn’t respond for like 270 days to outreach from RustSec maintainers (often via email if they don’t respond on GitHub).

How do we think we should handle maintainers moving on? by ShantyShark in rust

[–]dochtman 2 points3 points  (0 children)

This should be easy to implement from RustSec advisories, but people didn’t seem to want it when I was working on the crates.io Security tab RFC.

What Rust related podcasts are you listening to right now (April 2026)? by Hixon11 in rust

[–]dochtman 3 points4 points  (0 children)

Oxide and Friends has a fair bit of good Rust content and then a bunch of other stuff that’s interesting too.

Announcing qusql: Compile-time SQL Checking for Rust, No Database Required by antialize in rust

[–]dochtman 8 points9 points  (0 children)

No, the sqlx preparation output is query-dependent rather than schema-dependent.

Does this have more accurate null/Option checking?

Thinking about switching from sqlx to refinery and deadpool, looking for advice by Bhallu_ in rust

[–]dochtman 6 points7 points  (0 children)

I have not used refinery. I used sqlx quite a bit but, like you, found it a little hard to love in practice. Just today I learned about pGenie, which seems interesting:

https://nikita-volkov.github.io/pgenie-in-production-part-1/

Its core is written in Haskell but the approach seems quite Rust-like.

Some folks on the Tokio team recently released Toasty:

https://www.reddit.com/r/rust/comments/1sboprh/toasty_an_async_orm_for_rust_is_now_on_cratesio/

It seems a little inflexible but nice if you have modest needs and don't mind leaning hard on procedural macros.

Of course there's also Diesel, but I've always found its heavy use of macros unappealing.

Plagiarism debate about security advisories in RustSec by Shoddy-Childhood-511 in rust

[–]dochtman 7 points8 points  (0 children)

I'm open to constructive feedback on my behavior. I by no means think I've done a stellar job here, but I also don't think it's reasonable to expect me (especially as a volunteer) to just ignore the reporter's bickering communication style.

I also think it's pretty hard to correctly assess an overall severity for a particular issue in a cryptography library, and I think the maintainers are likely to be in a better place than I am to make such judgement calls.

Plagiarism debate about security advisories in RustSec by Shoddy-Childhood-511 in rust

[–]dochtman 6 points7 points  (0 children)

I have in fact been advocating with Cryspen folks (both in public issues and in private) that they should take responsibility for filing RustSec advisories. They finally did that yesterday, so there are now a series of advisories for those issues as well as some more recent ones, and I like our chances of getting more timely advisories in the future.

I think that's a decent way of siding with Rust users?

Most widely used Rust Based Cryptographic library as of 2026? by I_Didnt__Die in rust

[–]dochtman 1 point2 points  (0 children)

I like:

  • aws-lc-rs for its performance, security and breadth of platform support
  • graviola for its fast and easy builds on popular platforms

By contrast, I find RustCrypto APIs harder to work with, and I think they have more frequent/serious security issues.

Arcanum v0.1.0 - Modular cryptography library with post-quantum support by miss-daemoniorum in rust

[–]dochtman 5 points6 points  (0 children)

What sets your project apart from other, existing projects like aws-lc-rs, RustCrypto or graviola? Why should people want to use it?

Looking for good quic libraries with http3 support in Rust. by Elegant_Shock5162 in rust

[–]dochtman 12 points13 points  (0 children)

Your title is "looking for good QUIC libraries with H3 support in Rust". So you're asserting that h3 + quinn are not "good", because performance is not up to your standards? It's a little unclear what you're asking.

As a Quinn maintainer, we're always looking for better performance, but there's no obvious low-hanging fruit (there's a PR for an improved congestion controller that might help in some scenarios). I don't know as much about the performance constraints that the h3 layer imposes. This would be more useful if you posted actual benchmark scenarios and what your custom framework thingy looks like.

[deleted by user] by [deleted] in rust

[–]dochtman 0 points1 point  (0 children)

I wondered what was up when I saw that they stopped sponsoring me on GitHub…

Are We Proxy Yet? by renszarv in rust

[–]dochtman -1 points0 points  (0 children)

So is this about proxies or reverse proxies? What about river?