One of the really useful things is that there is now a (peer-reviewed) paper on the work, which covers much more detail about the motivation, as well as performance results ("same handshake performance as OpenSSL and 73% – 84% for bulk throughput").
some might have heard of this TLS stack as OCaml-TLS, but we rebranded it for our Usenix security paper. The paper includes an evaluation of common vulnerabilities in widely used TLS stacks in 2014.
Is the rebranding just for the paper or you plan on keeping it?
Or is it because you plan on making this available to non-OCaml applications as well (I think it was mentioned previously on HN that ctypes/cstubs could be used in reverse mode for this)?
Definitely working on making it available to non-OCaml applications as well. The most obvious way is by using 'tlstunnel' to act as a TLS terminator to TCP, but also via inverted Ctypes to ship a shared library and C header files. More on that when it's working...
https://nqsb.io/nqsbtls-usenix-security15.pdf