RECENT BLOG NEWS
wolfSSL in MySQL
Currently MySQL comes bundled with yaSSL to provide an option for SSL/TLS connections when using a database. An update for MySQL to use the most recent wolfSSL library (formerly CyaSSL) instead of yaSSL is under way.
Along with an increased level of security comes the potential to use progressive features offered by wolfSSL – such as ChaCha20 / Poly1305 AEAD cipher suites (ex: ECDHE-RSA-CHACHA20-POLY1305). wolfSSL will fit nicely into both Open Source and commercial applications as it is dual licensed under both GPLv2 and standard commercial license terms.
For more information about the status of this port contact us at facts@wolfssl.com
What does the Bar Mitzvah Attack mean for wolfSSL users?
This attack is based on the weak keys that the outdated stream cipher RC4 can sometimes generate. Simply put, stop using RC4 in TLS connections. In fact, wolfSSL (formerly CyaSSL) recently turned off the RC4 algorithm at build time. This will be the default starting with the upcoming 3.4.6 release. There has certainly been a pattern in the attacks that we’ve seen on TLS in the last few years; older Protocol versions, older modes, and older key sizes. We suggest using TLS 1.2 with AEAD ciphers and forward secrecy. Some people can’t get away with that in the interest of interoperability but it’s certainly the safest way forward that we can think of. Please contact us with any questions.
Feel free to visit our website at wolfssl.com or email us at facts@wolfssl.com.
Ed25519 Support Coming to wolfCrypt
wolfSSL is adding crypto level use of Ed25519 to wolfCrypt and plans to add TLS use of Ed25519 in the future. Benchmarks of our Ed25519 implementation have shown that the sign time can be reduced by up to 90% and verify time by up to 65% compared with the common ECC-DSA!
The following are some initial benchmarks:
CPU: 2.5 GHz Intel Core i7
ECC 256 key generation 0.775 milliseconds, avg over 100 iterations
EC-DSA sign time 0.739 milliseconds, avg over 100 iterations
EC-DSA verify time 0.528 milliseconds, avg over 100 iterations
ED25519 key generation 0.055 milliseconds, avg over 100 iterations
ED25519 sign time 0.053 milliseconds, avg over 100 iterations
ED25519 verify time 0.184 milliseconds, avg over 100 iterations
Raspberry Pi (ARM 700MHz)
ECC 256 key generation 82.494 milliseconds, avg over 100 iterations
EC-DSA sign time 84.862 milliseconds, avg over 100 iterations
EC-DSA verify time 52.444 milliseconds, avg over 100 iterations
ED25519 key generation 1.543 milliseconds, avg over 100 iterations
ED25519 sign time 1.821 milliseconds, avg over 100 iterations
ED25519 verify time 3.832 milliseconds, avg over 100 iterations
For questions about wolfSSL contact us at facts@wolfssl.com
End of life for CyaSSL 3.0 and older versions
Hi! As of June 30, 2015, we will no longer support CyaSSL 3.0 and older versions. If you are using these older versions and need support to upgrade them, please contact us. We can help you with the upgrade.
Case Study: wolfSSL Provides Encryption for TwistM2M Platform
TwistM2M has released their multitalented, Verizon Wireless certified M2M device that allows cloud connectivity through Exosite’s secure cloud-based platform. This provides developers with a wide variety of widgets that can be used with the numerous sensors on the TwistM2M board including accelerometers, GPS, temperature and light sensors. The TwistM2M device is ideal for any developer wanting an Internet of Things (IoT) solution that can significantly shorten setup time and allow for many customizable applications.
wolfSSL was chosen as the SSL/TLS library for TwistM2M due to its extensive PIC32 support and lightweight capacity. wolfSSL also provides an I/O abstraction layer that helped TwistM2M tailor the SSL I/O functionality to use both cellular and Ethernet connections, a requirement for their M2M device.
If you would like more information on the TwistM2M platform, feel free to visit their website at www.twisthink.com. The TwistM2M/wolfSSL case study can be viewed on the wolfSSL case studies page.
For questions regarding the use of wolfSSL products in your embedded or IoT devices, contact us at facts@wolfssl.com.
wolfSSL Roadmap
Curious about new features and additions to wolfSSL technologies including the lightweight wolfSSL SSL/TLS library (formerly CyaSSL)? Some items on our current roadmap include early TLS 1.3 adoption, curve25519 / ed25519 integration at the crypto and TLS level, more resource reduction options, and OCSP stapling support. In terms of new environments we’ll soon have more FIPS platforms, additional hardware acceleration options, easier integration with event programming, Data plane development support, SRP integration, better Intel assembly crypto speedups, and more Open Source project plugins. New product offerings will include wolfSSH and wolfCrypt as a separate library. We also anticipate offering our testing and security audit programs as services. Keep an eye out for connected home white papers and case studies. Something we missed, or something you would like to see on our roadmap? Please let us know.
Feel free to visit our website at wolfssl.com or email us at facts@wolfssl.com .
wolfSSL (CyaSSL) Support for Marvell 88MC200 Hardware AES Module
The Marvell 88MC200 is a system-on-chip microcontroller designed to be cost-effective, flexible, and easy to use. It was developed specifically for building connected smart devices and appliances. The Marvell 88MC200 is incredibly small (thumb-size) and runs energy efficient applications that can be used in mobile or cloud-based environments.
Marvell provides the Easy-Connect Software Development Kit (SDK) in combination with the 88MC200. This is a FreeRTOS-based software stack focusing on application-specific software functionality. One of the features of the 88MC200 is the inclusion of a hardware-accelerated AES module. When using wolfSSL in the Marvell SDK, wolfSSL automatically offloads AES operations into the 88MC200 hardware module. In doing so, users gain advantages in both speed and footprint size.
For more information on using wolfSSL with the Marvell 88MC200, contact us at facts@wolfssl.com. For detailed module information and other Marvell products, visit www.marvell.com.
wolfSSL on Cavium OCTEON
Looking for networking encryption and decryption? The powerful combination of wolfSSL and OCTEON hardware make for an exceptionally speedy and secure network connection. Cavium`s OCTEON processors have outstanding hardware acceleration support available for algorithms used in networking. For example in benchmarks ran using wolfSSL, AES operations increased from 8.6 MB/s to 261 MB/s with the OCTEON processor`s hardware acceleration support. That`s over 252 MB/s more!!
Along with hardware acceleration support for common symmetric algorithms, there is also support for asymmetric algorithms such as RSA and DH. A whole RSA encrypt and decrypt could be done in less than 7.5 milliseconds with hardware acceleration versus an average of 168 milliseconds without.
All of these massive increases in performance were seen with the use of just one core. The CN5860-SCP processor has the possibility of using all 16 cores, each core being able to handle its own SSL session. That`s the possibility of 16 independent and extremely fast SSL connections running in parallel.
For information about wolfSSL on Cavium OCTEON processors contact us at facts@wolfssl.com
wolfSSL and CyaSSL are not vulnerable to the recent FREAK attack
The FREAK Attack exploits legacy SSL cipher suites from the 1990s that use RSA export keys. By definition a server in export mode has to use a low bit strength RSA key (512 bits or less), which can now be cracked in around 12 hours. Even if a client supports export cipher suites but doesn’t broadcast support for them a man in the middle attacker can force the server to use the low grade key. Fortunately for wolfSSL and CyaSSL users we do no support export cipher suites and key derivation. No versions of wolfSSL or CyaSSL are vulnerable to the FREAK attack. For more information check out: https://freakattack.com and https://www.smacktls.com/#freak .
Or feel free to visit our website at wolfssl.com or email us at facts@wolfssl.com .
wolfSSL 3.4.0 is Now Available
Release 3.4.0 wolfSSL has bug fixes and new features including:
• wolfSSL API and wolfCrypt API, you can still include the cyassl and ctaocrypt headers which will enable the compatibility APIs for the foreseeable future
• Example use of the wolfCrypt API can be found in wolfcrypt/test/test.c
• Example use of the wolfSSL API can be found in examples/client/client.c
• Curve25519 now supported at the wolfCrypt level, wolfSSL layer coming soon
• Improvements in the build configuration under AIX
• Microchip PIC32 MZ updates
• TI-RTOS updates
• PowerPC updates
• Xcode project update
• Bidirectional shutdown examples in client/server with -w (wait for full shutdown) option
• Cycle counts on benchmarks for x86_64, more coming soon
• ALT_ECC_SIZE for reducing ecc heap use with fastmath when also using large RSA keys
• Various compile warnings
• Scan-build warning fixes
• Changed a memcpy to memmove in the sniffer (if using sniffer please update)
• No high level security fixes that requires an update though we always recommend updating to the latest
Weekly updates
Archives
- January 2025 (23)
- December 2024 (22)
- November 2024 (29)
- October 2024 (18)
- September 2024 (21)
- August 2024 (24)
- July 2024 (27)
- June 2024 (22)
- May 2024 (28)
- April 2024 (29)
- March 2024 (21)
- February 2024 (18)
- January 2024 (21)
- December 2023 (20)
- November 2023 (20)
- October 2023 (23)
- September 2023 (17)
- August 2023 (25)
- July 2023 (39)
- June 2023 (13)
- May 2023 (11)
- April 2023 (6)
- March 2023 (23)
- February 2023 (7)
- January 2023 (7)
- December 2022 (15)
- November 2022 (11)
- October 2022 (8)
- September 2022 (7)
- August 2022 (12)
- July 2022 (7)
- June 2022 (14)
- May 2022 (10)
- April 2022 (11)
- March 2022 (12)
- February 2022 (22)
- January 2022 (12)
- December 2021 (13)
- November 2021 (27)
- October 2021 (11)
- September 2021 (14)
- August 2021 (10)
- July 2021 (16)
- June 2021 (13)
- May 2021 (9)
- April 2021 (13)
- March 2021 (24)
- February 2021 (22)
- January 2021 (18)
- December 2020 (19)
- November 2020 (11)
- October 2020 (3)
- September 2020 (20)
- August 2020 (11)
- July 2020 (7)
- June 2020 (14)
- May 2020 (13)
- April 2020 (14)
- March 2020 (4)
- February 2020 (21)
- January 2020 (18)
- December 2019 (7)
- November 2019 (16)
- October 2019 (14)
- September 2019 (18)
- August 2019 (16)
- July 2019 (8)
- June 2019 (9)
- May 2019 (28)
- April 2019 (27)
- March 2019 (15)
- February 2019 (10)
- January 2019 (16)
- December 2018 (24)
- November 2018 (9)
- October 2018 (15)
- September 2018 (15)
- August 2018 (5)
- July 2018 (15)
- June 2018 (29)
- May 2018 (12)
- April 2018 (6)
- March 2018 (18)
- February 2018 (6)
- January 2018 (11)
- December 2017 (5)
- November 2017 (12)
- October 2017 (5)
- September 2017 (7)
- August 2017 (6)
- July 2017 (11)
- June 2017 (7)
- May 2017 (9)
- April 2017 (5)
- March 2017 (6)
- January 2017 (8)
- December 2016 (2)
- November 2016 (1)
- October 2016 (15)
- September 2016 (6)
- August 2016 (5)
- July 2016 (4)
- June 2016 (9)
- May 2016 (4)
- April 2016 (4)
- March 2016 (4)
- February 2016 (9)
- January 2016 (6)
- December 2015 (4)
- November 2015 (6)
- October 2015 (5)
- September 2015 (5)
- August 2015 (8)
- July 2015 (7)
- June 2015 (9)
- May 2015 (1)
- April 2015 (4)
- March 2015 (12)
- January 2015 (4)
- December 2014 (6)
- November 2014 (3)
- October 2014 (1)
- September 2014 (11)
- August 2014 (5)
- July 2014 (9)
- June 2014 (10)
- May 2014 (5)
- April 2014 (9)
- February 2014 (3)
- January 2014 (5)
- December 2013 (7)
- November 2013 (4)
- October 2013 (7)
- September 2013 (3)
- August 2013 (9)
- July 2013 (7)
- June 2013 (4)
- May 2013 (7)
- April 2013 (4)
- March 2013 (2)
- February 2013 (3)
- January 2013 (8)
- December 2012 (12)
- November 2012 (5)
- October 2012 (7)
- September 2012 (3)
- August 2012 (6)
- July 2012 (4)
- June 2012 (3)
- May 2012 (4)
- April 2012 (6)
- March 2012 (2)
- February 2012 (5)
- January 2012 (7)
- December 2011 (5)
- November 2011 (7)
- October 2011 (5)
- September 2011 (6)
- August 2011 (5)
- July 2011 (2)
- June 2011 (7)
- May 2011 (11)
- April 2011 (4)
- March 2011 (12)
- February 2011 (7)
- January 2011 (11)
- December 2010 (17)
- November 2010 (12)
- October 2010 (11)
- September 2010 (9)
- August 2010 (20)
- July 2010 (12)
- June 2010 (7)
- May 2010 (1)
- January 2010 (2)
- November 2009 (2)
- October 2009 (1)
- September 2009 (1)
- May 2009 (1)
- February 2009 (1)
- January 2009 (1)
- December 2008 (1)