wolfSSL SSL Sniffer Support

Do you have a need to analyze SSL traffic? Beginning with the wolfSSL 1.5.0 release, we have provided a build option allowing the wolfSSL embedded SSL library to be built with SSL Sniffer functionality. This means that you can collect SSL traffic packets and with the correct key file, are able to decrypt them as […]

Read MoreMore Tag

wolfSSL Build Sizes for the QNX Embedded RTOS

wolfSSL embedded ssl has been available for QNX since the first source release of the product.  We have compared wolfSSL’s current build size on QNX against OpenSSL and the results surprised us.  A standard wolfSSL build for QNX is 80k.  This compares to a standard OpenSSL build size of 2M.  The wolfSSL embedded implementation is […]

Read MoreMore Tag

CyaSSL 1.6.5 is now available

Release 1.6.5 for CyaSSL adds bug fixes and x509 v3 self signed certificate generation.  For general build instructions see doc/Building_CyaSSL.pdf.  For details on how to use certificate generation, refer to section 11 in the wolfSSL manual. To enable certificate generation support, add this option to ./configure ./configure –enable-certgen An example is included in ctaocrypt/test/test.c and documentation […]

Read MoreMore Tag

Timothy Stapko – Top Ten Considerations for embedded Wi-Fi device security

Here’s a nice article for embedded designers faced with securing an 802.11 device:  https://www.embedded.com/design/prototyping-and-development/4206409/10-things-to-consider-when-securing-an-embedded-802-11-Wi-Fi-device. Stapko’s item 8 on the list caught our attention.  He correctly states that “Wi-Fi security protocols are big and slow.”  However, the article is an overview, and is not intended to discuss which ones are bigger and slower, and which ones are […]

Read MoreMore Tag

More good commentary on exposed devices

John Sawyer of Dark Reading has put out another great blog post on using SHODAN to find exposed network devices like “printers, routers, fiber channel switches and industrial control systems” on a corporate network, and provides some useful advice for discovering those devices.  See:  https://www.darkreading.com/risk/finding-exposed-devices-on-your-network/d/d-id/1134269? for the full post.

Read MoreMore Tag