wolfSSL is glad to announce that it is incorporating American Fuzzy Lop (AFL) into its testing suite.Improving security is the at the heart of what wolfSSL is about. That is why wolfSSL has decided to include the AFL fuzzer to its list of tools. Finding bugs first locally allows our teams to make improvements to […]
Read MoreMore TagCategory: Uncategorized
Using wolfSSL on the Atmel ATECC508A with TLS 1.3 (#TLS13)
As previously announced, the wolfSSL embedded SSL/TLS library and wolfCrypt embedded crypto engine support the Atmel ATECC508A crypto element. This allows wolfSSL to take advantage of the ECC hardware acceleration and protected private key storage on the ATECC508A. Using wolfSSL, ATECC508A users can benefit from both increased ECC performance and secure key storage, thus hardening […]
Read MoreMore TagwolfSSL with Intel SGX and TLS 1.3 (#TLS13)
As we announced last month, wolfSSL now includes a port for Intel® SGX (Software Guard Extensions) with Linux (specifically, Ubuntu 16.04). Using wolfSSL with SGX Linux takes advantage of Intel® SGX technology to separate untrusted and trusted code, isolating the wolfSSL library from potentially malicious applications running on the host machine. Curious about using wolfSSL’s […]
Read MoreMore TagwolfSSL and OSS-Fuzz
Recently, Google announced OSS-Fuzz with the aim of making “common open source software more secure and stable by combining modern fuzzing techniques and scalable distributed execution.” And when they said that they would like to see us at OSS-Fuzz, we were interested. You can read up on OSS-Fuzz at their official Github page, but to summarize the whole thing, […]
Read MoreMore TagwolfSSL is Integrating Testing with the tlsfuzzer
Fuzz testing is an important part of maintaining a secure code base here at wolfSSL. While we already have fuzzers in use ensuring that our library is as secure as possible, we recently decided to integrate 4 more fuzzers with our library to ensure that no potential bugs go undetected. This is one of many […]
Read MoreMore TagTransport-Level Security Tradeoffs using MQTT
By Todd Ouska, wolfSSL The Message Queuing Telemetry Transport protocol, or MQTT, has become a favorite of Internet of Things (IoT) developers, and why not? It’s incredibly lightweight (on the order of a couple Kb for client implementations), has easy-to-use APIs, and is available for free under the Eclipse Public License (EPL). If your connected application is […]
Read MoreMore TagAnnouncing wolfSSH v1.1.0!
wolfSSH v1.1.0 is now available for download. This release contains an update to use DH GEX with SHA-256 during the key exchange. The wolfSSH server library is a lightweight implementation of the SSH v2 protocol suite for embedded servers. It is written in C from scratch. wolfSSH keeps a small footprint by using the wolfCrypt […]
Read MoreMore TagDifferences between TLS 1.2 and TLS 1.3
wolfSSL’s embedded SSL/TLS library has included support for TLS 1.3 since early releases of the TLS 1.3 draft. Since then, wolfSSL has remained up-to-date with the TLS 1.3 specification. In this post, the major upgrades of TLS 1.3 from TLS 1.2 are outlined below: TLS 1.3 This protocol is defined in RFC 8446. TLS 1.3 […]
Read MoreMore TagwolfSSL with Intel SGX on Linux
wolfSSL now includes a port for Intel® SGX (Software Guard Extensions) with Linux (specifically, Ubuntu 16.04). Using wolfSSL with SGX Linux takes advantage of Intel® SGX technology to separate untrusted and trusted code, isolating the wolfSSL library from potentially malicious applications running on the host machine. Curious about the extra security afforded by running wolfSSL in […]
Read MoreMore TagwolfSSL Announces Partnership with Infineon
wolfSSL would like to announce to our community that we are now partnered with Infineon. This partnership should make it easier to get wolfSSL up and running on Infineon-based projects that need to be secured! The wolfSSL embedded SSL/TLS library is a perfect fit for securing lightweight, resource-constrained devices. wolfSSL has a footprint size of […]
Read MoreMore Tag
