A post that recently caught our eye, titled “Dozens of exploits released for popular SCADA programs” by Dan Goodin at theregister.co.uk, reveals that SCADA systems may not be as secure as some people think. In the article, Luigi Auriemma, one of the researchers who released the vulnerabilities, stated that “SCADA is a critical field but […]
Read MoreMore TagMonth: March 2011
wolfSSL Build Option in CURL
With the next release of CURL and libcurl, 7.21.5, there will be support for the wolfSSL Embedded SSL Library. This allows CURL to leverage the benefits of the wolfSSL library – including its small footprint, optimizations for embedded environments, and support for TLS 1.2. First released in 1997, CURL (“Client for URLs”) is a command […]
Read MoreMore TagBorn in the USA!
Hi! We’ve received a lot of questions recently about the origins of the wolfSSL software package. We get asked where was it developed, and by who? The questions usually come from US government agencies and their contractors. Simply stated, mes amis, wolfSSL was Born in the USA and written by US citizens.
Read MoreMore TagEncrypted PKCS#8 Support in wolfSSL
PKCS (Public Key Cryptography Standards) refers to a group of standards created and published by RSA Security, Inc. PKCS#8 is designed as the Private-Key Information Syntax Standard, which is used to store private key information – including a private key for some public-key algorithm and set of attributes. The PKCS#8 standard has two versions which […]
Read MoreMore TagSeeking Collaborators for Secure Firmware Update System
One of the upcoming projects on our list is a Secure Firmware Update System. As we have stated before, we believe that digitally signing the firmware that is loaded onto your devices is a very high priority. Digitally signing your firmware updates offers several benefits, including: – Protecting against updates from unauthorized parties – Enabling […]
Read MoreMore TagAnswers to Common Questions from RSA – Part 5
Welcome to part five, the final post in our series of commonly-asked questions that we were asked at the 2011 RSA conference. In this post, we will be covering the following questions: Where is yaSSL located? Does the yaSSL Embedded Web Server compete with nginx? Q: Where is yaSSL located? yaSSL is based out of […]
Read MoreMore TagAnswers to Common Questions from RSA – Part 4
Welcome to part four in our series of commonly-asked questions that we were asked at the 2011 RSA conference. In this post, we will be covering the following questions: What does wolfSSL have as far as Certificate Management?Is the yaSSL Embedded Web Server similar to Apache / mod_ssl? Q: What does wolfSSL have as far […]
Read MoreMore TagNTRU Resistant to Quantum Attacks
As you know, yaSSL has partnered with Security Innovations to provide wolfSSL with NTRU cipher suites. Recently, Security Innovation and wolfSSL won the “Tomorrow’s Technology Today” award for Mobile Encryption. In addition, Security Innovation won the award for “Cryptography” for NTRU. One of the advantages that NTRU offers is resistance to quantum attacks. Other public […]
Read MoreMore TagyaSSL Embedded Web Server Benchmark
We recently ran a benchmark on the yaSSL Embedded Web Server and wanted to share the results. Our benchmarking tool was Apache ab. To learn more about ab, you can reference Apache’s documentation page (http://httpd.apache.org/docs/current/programs/ab.html), or if it is installed on your system, look at the ab man page (man ab). With a concurrency level […]
Read MoreMore TagAnswers to Common Questions from RSA – Part 3
Welcome to part three in our series of commonly-asked questions that we were asked at the 2011 RSA conference. In this post, we will be covering the following questions: Why is there a wolf in the yaSSL logo?How does wolfSSL compare to OpenSSL? Q: Why is there a wolf in the yaSSL logo?Why does a […]
Read MoreMore Tag
