RECENT BLOG NEWS
wolfSSL + NGINX
Hi! We have been asked a number of times about wolfSSL integration with the Nginx web server. If you are not familiar with Nginx, it is a high performance, high concurrency web server that is becoming extremely popular these days. You can learn more about Nginx at nginx.com.
Nginx and wolfSSL make a likely pairing because they are both lean, compact, fast, and scale well under high volumes of connections. The big news today is that wolfSSL is now working with Nginx! We have added a new configure option “–enable-nginx” which will compile the wolfSSL libraries with NGINX support. For more info please contact us today facts@wolfssl.com!
Using wolfSSL with #ContikiOS
Hi! Are you interested in using wolfSSL with the Contiki OS? If so, let us know at facts@wolfssl.com! The wolfSSL lightweight SSL/TLS library is a perfect match for resource-constrained embedded IoT devices. wolfSSL currently supports up to TLS 1.2 and DTLS 1.2, with TLS 1.3 support up and coming.
Contiki, as described by their website, is “an open source operating system for the Internet of Things. Contiki connects tiny low-cost, low-power microcontrollers to the Internet. Contiki is a powerful toolbox for building complex wireless systems.”
As those microcontrollers are connecting to the Internet, secure connectivity with SSL/TLS/DTLS is important. We look forward to hearing your thoughts about using wolfSSL with Contiki!
wolfSSL + Tenasys INTime RTOS
wolfSSL recently completed a port to Tenasys INTime RTOS! You can read more in the press release from Tenasys here: Secured INtime system traffic!
Tenasys is using wolfSSL to secure their networked real-time systems and wolfSSL is happy to be integrated into the INTime networking stack which allows us to provide world renowned security to INTime SDK consumers. If you have any questions about this please contact wolfSSL: facts@wolfssl.com
wolfSSL + Micro-T Kernel, TRON, T-ENGINE
wolfSSL has support for The Real-time Operating system Nucleus’ (TRONs’) Micro T-Kernel or (uT-Kernel / ?T-Kernel). Users can define “WOLFSSL_uTKERNEL2” in their project settings to take advanatage of wolfSSL support for this popular T-Engine Forum integrated project!
If you have any questions please contact wolfSSL: facts@wolfssl.com!
wolfSSL is Expanding Our Compatibility Layer
Tired of using OpenSSL? Recently wolfSSL has been expanding our compatibility layer, which means that it soon will be even easier to replace OpenSSL with wolfSSL in existing projects. In some cases the replacement can be as easy as including
For more information about the wolfSSL or the compatibility layer contact us at facts@wolfssl.com.
wolfSSL 2017 Roadmap
Curious about new features and additions to wolfSSL technologies for the coming year? Some items on our current roadmap include increasing performance through hardware acceleration and instruction level tuning, resource reduction tuning, and increasing our Async Crypto support to other projects like nginx. Our TLS 1.3 draft support is ready for testing and should the specification go final our release will be one of the first.
In terms of new environments we’ll have more FIPS platforms, more FIPS algorithms, easier integration with event programming, Data plane development support, more language wrappers, SGX support at the TLS level, and more Open Source project plugins including HAProxy, nginx, and wpa_supplicant.
Look for product improvements to wolfMQTT, wolfSSH, and wolfCrypt. We also anticipate offering our testing and security audit programs as services. Keep an eye out for connected home white papers and case studies. Something we missed, or something you would like to see on our roadmap? Please let us know.
Or feel free to visit our website at wolfssl.com or email us at facts@wolfssl.com.
Everything you wanted to know about how wolfSSL support handles vulnerability reports, but were afraid to ask
Sometimes the consumers of the wolfSSL Embedded TLS library are curious about our internal process for handling vulnerability reports. The first thing our users need to know is that wolfSSL takes every vulnerability report seriously! We currently maintain a mean time to verification of about 1.5 hours. Our mean time to achieve a fix is about 12 hours. As most of our readers know, not all CVE’s are created equally, so our fixes can take anywhere from 24 minutes to 24 hours.
The final statistic we can share is one that we are particularly proud of: Our mean time between a report and a release over the last 3 years is 38 hours! We believe this is an industry leading number, and one that we will strive to maintain and even improve!
Break-down of wolfSSL vulnerability response procedures:
#1 – (45 – 120 minutes)
– Support staff de-prioritizes all support to confirm vulnerability exists
– Support staff makes any necessary modifications to provided test code to make it build out-of-the-box for engineering team
– Support staff creates README for engineering team to be able to re-produce in 10 minutes or less
– As soon as validated and tests streamlined alert is sent to engineering team along with report and test case
#2 – (20 minutes – 1 day)
– Engineering team fixes the issue and opens a pull request
– Multiple engineers review fix
#3 – (1 hour)
– Jenkins automated integration server tests fix
#4 – (1 hour)
– Senior Engineer reviews Jenkins results and suggested fix
#5 – (N/A)
– repeat steps #2 – #4 as necessary
#6 – (N/A)
– Fix is merged
#7 (1 day)
– Release process started
– New GPL licensed release posted to website
– Commercial Releases sent to customers
wolfSSL Microchip MLA Support
In addition to ongoing support for MPLAB Harmony, wolfSSL has updated its support for Microchip Libraries for Applications (MLA). Using wolfSSL`s embedded SSL/TLS libraries we created an MLA TCP/IP demo using the PIC32 Ethernet Starter Kit, which enables SMTP and HTTPS over SSL/TLS. For access to this demo contact us today at facts@wolfssl.com.
If you are using Microchip’s MLA on any of the supported platforms (PIC16, PIC18, PIC24, dsPIC33, or PIC32) and looking for an embedded TLS solution, or have questions, please contact our support team at support@wolfssl.com, we would be more than happy to support your efforts!
References:
MLA Support: https://www.wolfssl.com/wolfSSL/wolfssl-pic32.html
Supported Platforms: http://www.microchip.com/mplab/microchip-libraries-for-applications
wolfSSL Hardware Crypto Support for TIVA-C
@wolfSSL has been collaborating with @TXInstruments for some time to provide ongoing hardware encryption support for your #IoT projects! Hardware support for the following algorithms is available in the #wolfSSL #embedded #TLS #SSL library when building with #TIRTOS for the #TivaC(PDF) micro controller.
AES
CCM
DES3
MD5
SHA
SHA-224
SHA-256
For instructions on building wolfSSL on TIRTOS, the following guide is very useful! Also included in the guide are details on setting up a TLS example server!
https://github.com/wolfSSL/wolfssl-examples/blob/master/tirtos_ccs_examples/README.md
For any other questions or info please contact support@wolfssl.com or facts@wolfssl.com
wolfSSL Hardware Crypto Support for TIVA-C
@wolfSSL has been collaborating with @TXInstruments for some time to provide ongoing hardware encryption support for your #IoT projects! Hardware support for the following algorithms is available in the #wolfSSL #embedded #TLS #SSL library when building with #TIRTOS for the #TivaC micro controller.
AES
CCM
DES3
MD5
SHA
SHA-224
SHA-256
For instructions on building wolfSSL on TIRTOS, the following guide is very useful! Also included in the guide are details on setting up a TLS example server!
https://github.com/wolfSSL/wolfssl-examples/blob/master/tirtos_ccs_examples/README.md
For any other questions or info please contact support@wolfssl.com or facts@wolfssl.com
Weekly updates
Archives
- January 2025 (2)
- December 2024 (22)
- November 2024 (29)
- October 2024 (18)
- September 2024 (21)
- August 2024 (24)
- July 2024 (27)
- June 2024 (22)
- May 2024 (28)
- April 2024 (29)
- March 2024 (21)
- February 2024 (18)
- January 2024 (21)
- December 2023 (20)
- November 2023 (20)
- October 2023 (23)
- September 2023 (17)
- August 2023 (25)
- July 2023 (39)
- June 2023 (13)
- May 2023 (11)
- April 2023 (6)
- March 2023 (23)
- February 2023 (7)
- January 2023 (7)
- December 2022 (15)
- November 2022 (11)
- October 2022 (8)
- September 2022 (7)
- August 2022 (12)
- July 2022 (7)
- June 2022 (14)
- May 2022 (10)
- April 2022 (11)
- March 2022 (12)
- February 2022 (22)
- January 2022 (12)
- December 2021 (13)
- November 2021 (27)
- October 2021 (11)
- September 2021 (14)
- August 2021 (10)
- July 2021 (16)
- June 2021 (13)
- May 2021 (9)
- April 2021 (13)
- March 2021 (24)
- February 2021 (22)
- January 2021 (18)
- December 2020 (19)
- November 2020 (11)
- October 2020 (3)
- September 2020 (20)
- August 2020 (11)
- July 2020 (7)
- June 2020 (14)
- May 2020 (13)
- April 2020 (14)
- March 2020 (4)
- February 2020 (21)
- January 2020 (18)
- December 2019 (7)
- November 2019 (16)
- October 2019 (14)
- September 2019 (18)
- August 2019 (16)
- July 2019 (8)
- June 2019 (9)
- May 2019 (28)
- April 2019 (27)
- March 2019 (15)
- February 2019 (10)
- January 2019 (16)
- December 2018 (24)
- November 2018 (9)
- October 2018 (15)
- September 2018 (15)
- August 2018 (5)
- July 2018 (15)
- June 2018 (29)
- May 2018 (12)
- April 2018 (6)
- March 2018 (18)
- February 2018 (6)
- January 2018 (11)
- December 2017 (5)
- November 2017 (12)
- October 2017 (5)
- September 2017 (7)
- August 2017 (6)
- July 2017 (11)
- June 2017 (7)
- May 2017 (9)
- April 2017 (5)
- March 2017 (6)
- January 2017 (8)
- December 2016 (2)
- November 2016 (1)
- October 2016 (15)
- September 2016 (6)
- August 2016 (5)
- July 2016 (4)
- June 2016 (9)
- May 2016 (4)
- April 2016 (4)
- March 2016 (4)
- February 2016 (9)
- January 2016 (6)
- December 2015 (4)
- November 2015 (6)
- October 2015 (5)
- September 2015 (5)
- August 2015 (8)
- July 2015 (7)
- June 2015 (9)
- May 2015 (1)
- April 2015 (4)
- March 2015 (12)
- January 2015 (4)
- December 2014 (6)
- November 2014 (3)
- October 2014 (1)
- September 2014 (11)
- August 2014 (5)
- July 2014 (9)
- June 2014 (10)
- May 2014 (5)
- April 2014 (9)
- February 2014 (3)
- January 2014 (5)
- December 2013 (7)
- November 2013 (4)
- October 2013 (7)
- September 2013 (3)
- August 2013 (9)
- July 2013 (7)
- June 2013 (4)
- May 2013 (7)
- April 2013 (4)
- March 2013 (2)
- February 2013 (3)
- January 2013 (8)
- December 2012 (12)
- November 2012 (5)
- October 2012 (7)
- September 2012 (3)
- August 2012 (6)
- July 2012 (4)
- June 2012 (3)
- May 2012 (4)
- April 2012 (6)
- March 2012 (2)
- February 2012 (5)
- January 2012 (7)
- December 2011 (5)
- November 2011 (7)
- October 2011 (5)
- September 2011 (6)
- August 2011 (5)
- July 2011 (2)
- June 2011 (7)
- May 2011 (11)
- April 2011 (4)
- March 2011 (12)
- February 2011 (7)
- January 2011 (11)
- December 2010 (17)
- November 2010 (12)
- October 2010 (11)
- September 2010 (9)
- August 2010 (20)
- July 2010 (12)
- June 2010 (7)
- May 2010 (1)
- January 2010 (2)
- November 2009 (2)
- October 2009 (1)
- September 2009 (1)
- May 2009 (1)
- February 2009 (1)
- January 2009 (1)
- December 2008 (1)