The first alpha release of OpenSSL 4.0 introduces Encrypted Client Hello (ECH) support, removes legacy SSLv3 and engine code, and adds new cryptographic features.
OpenSSL 4.0 Alpha 1 Released With Encrypted Client Hello "ECH" & Other Features

The OpenSSL project has released the first alpha version of OpenSSL 4.0, marking a significant milestone in the evolution of this widely-used cryptographic library. The new release brings both breaking changes and exciting new features aimed at modernizing the codebase and enhancing security.
Major Breaking Changes
OpenSSL 4.0 represents a clean break from legacy code that has accumulated over decades. The most notable removal is support for SSLv3, a protocol that has been deprecated for over a decade due to numerous security vulnerabilities. This removal aligns with current security best practices and eliminates code that has long been considered unsafe.
The release also drops support for OpenSSL engines, a feature that allowed hardware acceleration and cryptographic offload to specialized hardware. While this feature served important use cases in the past, its removal simplifies the codebase and reflects the current trend toward software-based cryptography with hardware acceleration handled at lower levels.
New Security Feature: Encrypted Client Hello (ECH)
The headline feature in OpenSSL 4.0 is support for TLS Encrypted Client Hello (ECH), also known as RFC 9849. This security enhancement encrypts the initial Client Hello message during the TLS handshake, preventing the exposure of Server Name Indication (SNI) information.
How ECH Works
Traditionally, the Client Hello message contains plaintext SNI data that reveals the destination hostname to anyone monitoring the connection. This leakage can compromise privacy and enable traffic analysis. ECH addresses this by:
- Encrypting the SNI field within the Client Hello
- Allowing clients to specify an "ECH configuration" that servers can use to decrypt the information
- Maintaining backward compatibility with servers that don't support ECH
The feature serves as a replacement for Encrypted Server Name Indication (ESNI), offering improved security and broader compatibility. ECH represents a significant step forward in protecting user privacy during the initial stages of TLS connections.
Additional Cryptographic Enhancements
Beyond ECH, OpenSSL 4.0 Alpha 1 introduces several new cryptographic capabilities:
- RFC 8998 Signature Algorithm Support: Adds support for new signature algorithms defined in this RFC
- cSHAKE Function Support: Implements the customizable SHAKE extendable-output function from the SHA-3 family
- ML-DSA-MU Digest Algorithm Support: Adds support for the ML-DSA (Modular Lattice-based Digital Signature Algorithm) with multiple user capabilities
- SNMP KDF Support: Implements Key Derivation Functions for Simple Network Management Protocol
- SRTP KDF Support: Adds Key Derivation Functions for Secure Real-time Transport Protocol
These additions expand OpenSSL's cryptographic toolkit, supporting emerging standards and providing developers with more options for secure implementations.
Development and Testing
The alpha release is now available for testing through GitHub, where developers can access the source code and documentation. This early release allows the community to:
- Test compatibility with existing applications
- Identify any regressions or issues
- Provide feedback on the new API and features
- Prepare for the eventual stable release
Implications for Developers and System Administrators
Organizations using OpenSSL should begin planning for the transition to version 4.0. Key considerations include:
- Compatibility Testing: Applications relying on removed features (SSLv3, engines) will need updates
- Security Benefits: ECH support provides enhanced privacy for TLS connections
- Performance Impact: The removal of legacy code may improve performance and reduce attack surface
- Migration Timeline: The alpha release provides ample time for testing before the stable release
Looking Forward
OpenSSL 4.0 represents a maturing of the library, shedding outdated features while embracing modern security standards. The focus on privacy-enhancing features like ECH reflects growing awareness of the importance of protecting metadata in network communications.
As the project moves through alpha, beta, and toward a stable release, the community will play a crucial role in ensuring a smooth transition. The alpha release provides an opportunity for early adopters to contribute to the development process and help shape the final product.
For developers interested in exploring the new features, the source code and documentation are available on GitHub. The project welcomes testing and feedback as it continues to refine OpenSSL 4.0 toward its eventual stable release.


Comments
Please log in or register to join the discussion