wolfMQTT Client Supports HiveMQ Cloud

The wolfMQTT client library “mqttclient” example demonstrates securely connecting over TLS provided by wolfSSL.

We set up a HiveMQ Cloud cluster that can be used for testing. The HiveMQ Cloud broker uses the Server Name Indicator (SNI) extension for TLS client authentication, which is specified using the `-S ` option. The example is located in `/examples/mqttclient/`. You can test with our HiveMQ Cloud cluster using:

./examples/mqttclient/mqttclient -h 833f87e253304692bd2b911f0c18dba1.s1.eu.hivemq.cloud -t -S -u wolf1 -w NEZjcm7i8eRjFKF -p 8883

Everyone deserves to have their IoT data secure, and wolfSSL provides the best libraries to accomplish that! Secure-IoT-Love from the wolfSSL team!

You can download the latest release here: https://www.wolfssl.com/download/

Or clone directly from our GitHub repository: https://github.com/wolfSSL/wolfMQTT

Don’t forget to add a star while you’re there!

If you have any questions or run into any issues, contact us at facts@wolfssl.com, or call us at +1 425 245 8247.

Embedded SSH client with TPM protected keys

We are adding hardware security to wolfSSH to meet the rising security requirements for connected systems.

Thanks to the widely available Trusted Platform Module (TPM) and our portable wolfTPM library, wolfSSH can have the user’s private SSH key stored and used directly from a hardware security module. This way the private key material is never exposed in raw form and the system has physical tamper-proof protection of its important secrets.

wolfSSH is a portable SSH v2.0 client and server. It also supports the SCP and SFTP protocols. This makes wolfSSH a preferred choice for embedded systems and applications. 

wolfTPM is a portable TPM 2.0 library, designed for baremetal and embedded systems. wolfTPM has its own TPM Interface Layer (TIS) developed in accordance with the Trusted Computing Group Group (TCG). This allows wolfTPM to operate in every operating environment, because it does not require a TPM driver.

For information on our wolfSSH capabilities see https://www.wolfssl.com/products/wolfssh/.

Do you want to use SSH with hardware protected keys?

If you have any questions or run into any issues, contact us at facts@wolfssl.com, or call us at +1 425 245 8247.

Integration update: wolfSSL is the Secure Socket Solution for Qt

The QSslSocket class in Qt makes it easy to add encryption to your application. wolfSSL makes it secure!

The wolfSSL embedded SSL/TLS library is a lightweight SSL/TLS library written in ANSI C and targeted for embedded, RTOS, and resource-constrained environments – primarily because of its small size, speed, and feature set.  It is commonly used in standard operating environments as well because of its royalty-free pricing and excellent cross-platform support. wolfSSL supports industry standards up to the current TLS 1.3 and DTLS 1.2 levels, is up to 20 times smaller than OpenSSL, supports FIPS, and has critical interfaces like TPM 2.0 and  PKCS#11.

Qt has traditionally used OpenSSL as the provider for SSL/TLS in Qt Network for secure network communications. wolfSSL 4.4.0 adds support for building Qt 5.12 and 5.13 against the wolfSSL embedded SSL/TLS library instead of the default OpenSSL backend! The wolfSSL integration with Qt provides a performance-minded alternative, ideal for Qt developers who are looking for a lightweight, progressive, and well-tested SSL/TLS implementation.  

Using wolfSSL as a TLS provider in Qt can have many advantages, depending on application and industry.  Some of these may include:

To learn more about the advantages of using wolfSSL, visit our page on “wolfSSL vs. OpenSSL”. For more insight into building Qt with wolfSSL, the advantages it brings to Qt developers when used in place of OpenSSL, and the current state of SSL/TLS and the cryptography algorithms used, watch this recorded talk by our Engineering Manager, Chris Conlon. 

For instructions on how to compile Qt with the wolfSSL patch, please visit Building Qt with wolfSSL

If you have any questions or run into any issues, contact us at facts@wolfssl.com, or call us at +1 425 245 8247.

cURL Security Advisories

The 200th curl release found 3 major security advisories from the curl bug-bounty program. These are the advisories:

This is a Use-After-Free in the OpenSSL backend code that in the absolutely worst case can lead to an RCE, a Remote Code Execution. The flaw is reasonably recently added and it’s very hard to exploit but you should upgrade or patch immediately.

The issue occurs when TLS session related info is sent from the TLS server when the transfer that previously used it is already done and gone.

When libcurl accepts custom TELNET options to send to the server, it the input parser was flawed which could be exploited to have libcurl instead send contents from the stack.

In the Schannel backend code, the selected cipher for a transfer done with was stored in a static variable. This caused one transfer’s choice to weaken the choice for a single set transfer could unknowingly affect other connections to a lower security grade than intended.

If you have any questions or run into any issues, contact us at facts@wolfssl.com, or call us at +1 425 245 8247.

U-Boot with wolfTPM

We are integrating wolfTPM into U-Boot. This will extend the TPM 2.0 capabilities in U-Boot to include signature verification and measured boot.

For many platforms we can replace U-Boot such as on the Xilinx UltraScale+ MPSoC.

Our wolfBoot allows many features including:
* Partition signature verification using ED25519, RSA and ECC
* Encryption of partitions
* Updating of partitions in the boot loader
* Measured boot with TPM 2.0 PCR registers
* Offloading to crypto coprocessors like the TPM 2.0 modules
* Version checking for updates
* Rollback on failed updates

For information on our wolfBoot TPM integration see https://www.wolfssl.com/products/wolfboot/.

If you have any questions or run into any issues, contact us at facts@wolfssl.com, or call us at +1 425 245 8247.

Connect with wolfSSL:
Twitter
LinkedIn
Facebook

wolfSentry Operating Environments

Our first preview release of wolfSentry, the IDPS (Intrusion Detection and Prevention System) for embedded and IoT systems, has platform support for Raspberry Pi, STM32 with CubeMX, Atmel ASF and Barebox. As well as native support for Microsoft Windows and Linux.

Here at wolfSSL we are always striving to be better so we would love to hear which operating environments and platforms you would like to see supported by wolfSentry.

If you have any questions or run into any issues, contact us at facts@wolfssl.com, or call us at +1 425 245 8247.

wolfCrypt FIPS Operating Environments

wolfSSL fans! Do you like FIPS? Do you like virtual machines? Guess what. wolfSSL`s crypto library, wolfCrypt, is validated for FIPS 140-2 and in the process of being one of the first cryptography libraries to be validated for FIPS 140-3

As wolfCrypt is commonly used in standard operating environments because of its royalty-free pricing and excellent cross platform support, wolfCrypt FIPS has been validated on a number of Operating Environments (OEs). The current validated OE list for both wolfCrypt FIPS certificates (#2425 and #3389) are listed here for reference.  

Certificate #2425 Current OE List:

Operating SystemProcessorPlatform
Linux 3.13 (Ubuntu)Intel® Core™ i7-3720QM CPU @2.60GHz x 8HP EliteBook
iOS 8.1Apple™ A8iPhone™ 6
Android 4.4Qualcomm Krait 400Samsung Galaxy S5
FreeRTOS 7.6ST Micro STM32FuTrust TS Reader
Windows 7 (64-bit)Intel® Core™ i5Sony Vaio Pro
Linux 3.0 (SLES 11 SP4, 64-bit)Intel® Xeon® E3-1225Imprivata OneSign
Linux 3.0 (SLES 11 SP4, 64-bit) on Microsoft Hyper-V 2012R2 CoreIntel® Xeon® E5-2640Dell® PowerEdge™ r630
Linux 3.0 (SLES 11 SP4, 64-bit) on VMWare ESXi 5.5.0Intel® Xeon® E5-2640Dell® PowerEdge™ r630
Windows 7 (64-bit) on VMWare ESXi 5.5.0Intel® Xeon® E5-2640Dell® PowerEdge™ r630
Android Dalvik 4.2.2NXP i.MX6 MXT?700?NC 7” touch
panel
Linux 4.1.15NXP i.MX5NX?1200 NetLinx NX
Integrated Controller
Debian 8.8Intel Xeon® 1275v3CA PAM 304L Server
Windows Server 2012R2Intel® Xeon® E5335CA Technologies
PAMHAF995
Windows 7 Professional SP1Intel® Core™ i7?2640MDell™ Latitude™ E6520
Debian 8.7.0Intel ® Xeon® E3 Family with SGX supportIntel® x64 Server System
R1304SP
Windows 10 ProIntel ® Core ™ i5 with SGX supportDell™ Latitude™ 7480
NET+OS v7.6 Digi International NS9210Sigma IV infusion pump
Linux 4.4 (SLES 12 SP3, 64?
bit) on Microsoft Hyper?V
2016 Core
Intel® Xeon® E5?2650Dell® PowerEdge™ r720
Linux 4.4 (SLES 12 SP3, 64?
bit) on VMWare ESXi 6.5.0
Intel® Xeon® E5?2403Dell® PowerEdge™ r420

Certificate #3389 Current OE List:

Operating SystemProcessorPlatform
OpenRTOS v10.1.1STM32L4RxSTMicroelectronics STM32L4R9I-DISCO (Discovery Kit)
HP Imaging & Printing Linux 4.9ARMv8 Cortex-A72/A53HP PN 3PZ95-60002
Windows 10 EnterpriseIntel® Core™ i7-7820 x4Radar FCL Package Utility
Linux socfpga cyclone VArmv7 rev 0, Cortex A-9SEL 2700 Series 24-Port Ethernet Switch
Fusion Embedded RTOS 5.0Analog Devices ADSP-BF516 (Blackfin)Classone ® IP Radio Gateway
Linux 4.12 Yocto StandardFreescale i.MX6 DualLite ARMv7 Cortex-A9 x2Metasys® SNC Series Network Control Engine
Nucleus 3.0 version 2013.08.1Freescale Vybrid VF500XL200 Radio
CodeOS v1.4CT8200 (ARM FA626TE)HP ProLiant DL360
Linux 4.14Armv8 Cortex-A53SEL-2742S
CMSIS-RTOS v2.1.3Silicon Labs EFM32GAlto™
Windows CE 6.0ARM Cortex-A8HP LaserJet Enterprise
QNX 6.6NXP i.MX 6SoloX Arm® Cortex®-A9Zebra ZT610
QNX 7.0NXP i.MX7 Arm® Cortex®-A7 (x2)Zebra ZD621
QNX 6.5NXP i.MX25 Arm9™Zebra ZQ630
QNX 7.0NXP i.MX 6ULL Arm® Cortex®-A7Zebra ZT421
SUSE Linux Enterprise hosted in Hypervisor Vmware ESXi 6.7.0Intel® Xeon® E-2234Dell PowerEdge T340
Linux 4.14Dual ARM Cortex A9Lenovo XClarity Controller
Swoop Kernel 1.5Xilinx Zynq Ultrascale+ XCZU9EG™Skipper
Windows Server 2016Intel® Xeon® E5-2603Dell PowerEdge R430
NET+OS v7.6NS9210Sigma IV Infusion Pump
Windows 10 ProIntel® Core™ i7-7600ULenovo Thinkpad T470
Windows Server 2019Intel® Xeon® Silver 4116 (x24)HPE ProLiant DL360
Android 11Qualcomm Snapdragon 865 (SoC)Samsung Galaxy S20 5G
Linux 5.4Freescale i.MX7 Dual ARM® Cortex-A7iSTAR physical access controller
Linux 5.4Intel® Xeon® E-2244GDell PowerEdge R340 Rack Server
Linux 4.12Intel® Core™ i3-7101HP PageWide XL
Linux 4.9Freescale i.MX7 Dual ARM® Cortex-A7ZOLL Communications Module
NetBSD v6.0.1Intel(R) Atom(R) E3930RICOH IM C2500
NetBSD v6.0.1Intel(R) Atom(R) E3940RICOH IM C6000
Android 6.0 (Linux 4.1)Freescale i.MX6 Quad/DualLiteRICOH IM C6000
iOS 14Apple A14 BioniciPhone 12
Android 8.1 (Linux 4.4)Qualcomm Snapdragon 835 (APQ8098 / MSM8998)EchoNous Kosmos® Bridge
CentOS Linux 7.9 on VMware ESXi 6.7Intel® Xeon® X5650 @2.67GHzHP ProLiant DL360
Linux 3.10 (CentOS 7) Intel® Atom™ CPU D525 @1.80GHzBeckman Coulter PROService RAP BOX
Yocto (dunfell) 3.1AMD GX-412TC SoCLinkGuard
Linux 5.4Intel® Xeon® Gold 5218 CPU @ 2.30GHzLiveAction LiveNX Appliance
Windows 10 ProIntel® Core™ i7-1255U @1.70 GHzDell Precision 3570
FreeBSD 10.3 on VMWare ESXi 7.0Intel® Xeon® Silver 4210 @2.20GHzSupermicro X11DPH-i (vnc-wolf)
Linux 5.15 on VMWare ESXi 7.0Intel® Xeon® Silver 4210 @2.20GHzSupermicro X11DPH-i (sdlc-wolf)
Debian GNU/Linux 8 (jessie)Broadcom BCM5634Corning 1LAN-SDDP-24POE (onl-armel)
Linux IPHO00550F22 4.1Broadcom BCM6858Corning 1LAN-SDAN-7691 (bcm6858x)
Debian GNU/Linux 8 (jessie)Intel® Atom™ C2558 @ 2.40GHzufiSpace Cloud and Data Center Switch S7810-54QS (onl-x86_64)
Linux IPHO00559B23 3.4Broadcom BCM6838Corning 1LAN-SDAN-7290 (bcm683xx)
VxWorks 7 SR0630Intel® Core™ i7-5850EQ @2.70GHzF-16 WASP
macOS Monterey 12.5Intel® Core™ i7-8569U @2.80GHzMacBook Pro
macOS Monterey 12.5Apple M1 MaxMacBook Pro
Windows 11 EnterpriseIntel® Core™ i7-10610U @1.80GHzDell Latitude 7410
Endace Crypto Firmware 1.0Intel® Xeon® Silver 4316 CPU @2.30GHzEndaceProbe 2144
macOS Monterey 12.5Apple M1MacBook Air
Vortec SchedulerStarCore SC3850 DSPAvaya MP160
VxWorks 7NXP T1024G450 Media Gateway
VxWorks 6.9NXP MPC8650G430 Media Gateway
VxWorks 6.9TNETV1050Sectéra vIPer™ Phone
VxWorks 5.5Marvell Poncat2 Sheeva™ML6416E
Janteq Zynq Linux 5.4Xilinx Zynq-7000 SoCAviTr3
Janteq Zynq Linux 4.19Xilinx Zynq Ultrascale+Bronte3
Janteq S5L Linux 4.9Ambarella S5L SoCMaximo
Endace Crypto Firmware 1.0Intel® Xeon® Gold 6338N CPU @2.20GHzEndaceProbe 2184
Endace Crypto Firmware 1.0Intel® Xeon® Gold 5418N CPU @1.80GHzEndaceProbe 94C8
Endace Crypto Firmware 1.0Intel® Xeon® Gold 6230N CPU @2.30GHzEndaceProbe 92C8
Janteq iMX8QM Linux version 5.4i.MX8 Quad Max SoCFlip2
Android 13QualComm SnapDragon 8 SoCSamsung Galaxy S22

wolfSSL can easily add additional OEs to existing wolfCrypt FIPS certificates.

If you have any questions or run into any issues, contact us at facts@wolfssl.com, or call us at +1 425 245 8247.

strongSwan + wolfSSL + FIPS!

As some may be aware, wolfSSL added support for strongSwan in April of 2019. The upstream commit can be reviewed here: https://github.com/strongswan/strongswan/pull/133

Users can test the latest development master of wolfSSL with the latest version of strongSwan using the following setup:

wolfSSL Build and Installation Steps

$ git clone https://github.com/wolfSSL/wolfssl.git

$ cd wolfssl
$ ./autogen.sh

$ ./configure --enable-opensslall --enable-keygen --enable-rsapss --enable-des3 --enable-dtls --enable-certgen --enable-certreq --enable-certext --enable-sessioncerts --enable-crl --enable-ocsp CFLAGS="-DWOLFSSL_DES_ECB -DWOLFSSL_LOG_PRINTF -DWOLFSSL_PUBLIC_MP -DHAVE_EX_DATA"

$ make
$ make check
$ sudo make install

strongSwan Build and Installation Steps

# if the following packages are not already installed:
$ sudo apt-get install flex bison byacc libsoup2.4-dev gperf

$ git clone https://github.com/strongswan/strongswan.git
$ cd strongswan
$ ./autogen.sh

# if packages are missing autogen.sh must be re-run

$ ./configure --disable-defaults --enable-pki --enable-wolfssl --enable-pem
$ make
$ make check
$ sudo make install

wolfSSL has had interest in enabling FIPS 140-2/140-3 support with strongSwan so our engineers verified everything is working with the wolfCrypt FIPS 140-2 validated Module!

The steps wolfSSL used for testing are as follows:

Testing was done using the wolfSSL commercial FIPS release v4.7.0 which internally uses the wolfCrypt v4.0.0 FIPS 140-2 validated Crypto Module. It was located in the /home/user-name/Downloads directory on the target test system, Linux 4.15 Ubuntu 18.04 LTS running on Intel(R) Xeon(R) CPU E3-1270 v6 @ 3.80GHz.

  1. wolfSSL was configured and installed with these settings:
./configure --enable-opensslall --enable-keygen --enable-rsapss --enable-des3 --enable-dtls --enable-certgen --enable-certreq --enable-certext --enable-sessioncerts --enable-crl --enable-ocsp CFLAGS="-DWOLFSSL_DES_ECB -DWOLFSSL_LOG_PRINTF -DWOLFSSL_PUBLIC_MP -DHAVE_EX_DATA -DFP_MAX_BITS=8192" --enable-ed25519 --enable-curve25519 --enable-fips=v2 --enable-intelasm --prefix=$(pwd)/../fips-install-dir
 make
 make install
  1. A custom install location was used which equated to /home/user-name/Downloads/fips-install-dir and the configuration for strongSwan accounted for this.
  2. strongSwan was cloned to /home/user-name/Downloads with “git clone https://github.com/strongswan/strongswan.git
  3. StongSwan was configured and installed with these settings:
./configure --disable-defaults --enable-pki --enable-wolfssl --enable-pem --prefix=$(pwd)/../strongswan-install-dir wolfssl_CFLAGS="-I$(pwd)/../fips-install-dir/include" wolfssl_LIBS="-L$(pwd)/../fips-install-dir/lib -lwolfssl"
 make
 make install
 make check
  1. In the make check stage of the test, it was observed that 1 test was failing.
 Passed 34 of 35 'libstrongswan' suites
 FAIL: libstrongswan_tests
 ==================
 1 of 1 test failed
 ==================
  1. Reviewing the logs it was apparent one of the RSA tests was failing.
  2. Upon further debugging it turned out the failure was a test in strongSwan that was attempting to create an RSA key size of 1536-bits.
Running case 'generate':
 DEBUG: key_sizes[_i] set to 1024
 + PASS
 DEBUG: key_sizes[_i] set to 1536
 - FAIL
 DEBUG: key_sizes[_i] set to 2048
 + PASS
 DEBUG: key_sizes[_i] set to 3072
 + PASS
 DEBUG: key_sizes[_i] set to 4096
 + PASS

wolfSSL has a function RsaSizeCheck() which in FIPS mode will specifically reject any non FIPS RSA key sizes so this failure was not only expected, but it is a good thing for those wanting to use strongSwan in FIPS mode and ensure only FIPS-validated RSA key sizes will be supported!

wolfSSL is pleased that with the latest release of wolfSSL v4.7.0 and the wolfCrypt FIPS 140-2 module validated on FIPS certificate 3389, strongSwan support is working splendidly and wolfSSL engineers will be making efforts to ensure continued support into the future!

If you have any questions or run into any issues, contact us at facts@wolfssl.com, or call us at +1 425 245 8247.

wolfSSL devkitPro Support

devkitPro is a set of tool chains for compiling to gaming platforms. This includes the Nintendo Switch, 3DS, Wii, and Gamecube. If you need cryptographic or SSL/TLS capabilities in your games then wolfSSL has support for compiling with devkitPro. wolfSSL is a very lightweight and fast SSL/TLS library that will fit perfectly in a constrained game console environment.

This blog will showcase how to compile the wolfSSL testwolfcrypt program for Wii and run it in the Dolphin Emulator. It assumes that the devkitPro was installed in /opt/.

Compile wolfSSL using the devkitPPC tool chain:

./autogen.sh
./configure CFLAGS='-DDOLPHIN_EMULATOR -DDEVKITPRO -DGEKKO -DNO_WRITEV -I/opt/devkitpro/libogc/include -mrvl -mcpu=750 -mno-eabi -MMD -MP' LDFLAGS='-L/opt/devkitpro/libogc/lib/wii -lwiiuse -lbte -logc -lm' CC=/opt/devkitpro/devkitPPC/bin/powerpc-eabi-gcc RANLIB=/opt/devkitpro/devkitPPC/bin/powerpc-eabi-ranlib --host=ppc --enable-cryptonly --disable-shared --enable-static --disable-filesystem
make

Then convert the binary to a .dol file:

/opt/devkitpro/tools/bin/elf2dol wolfcrypt/test/testwolfcrypt ../testwolfcrypt.dol

The above command places the resulting binary in the directory that contains the wolfssl directory. Navigate to this directory in the Dolphin Emulator and run it:

If you have any questions or run into any issues, contact us at facts@wolfssl.com, or call us at +1 425 245 8247.

wolfSSL Asynchronous Release v4.7.0

The wolfSSL / wolfCrypt libraries support asynchronous (non-blocking) crypto using hardware acceleration with the Intel QuickAssist and Cavium Nitrox III/V adapters. These are PCIe devices that accelerate crypto operations. For server platforms requiring high connection rates and throughput this allows greatly increased performance.

For some performance numbers see this page: https://www.wolfssl.com/docs/intel-quickassist/

Release v4.7.0 of wolfSSL Async has bug fixes and new features including:

If you have any questions or run into any issues, contact us at facts@wolfssl.com, or call us at +1 425 245 8247.

Posts navigation

1 2 3 69 70 71 72 73 74 75 189 190 191