So, what’s new at wolfSSL? Take a look below to check out the most recent news, or sign up to receive weekly email notifications containing the latest news from wolfSSL. wolfSSL also has a support-specific blog page dedicated to answering some of the more commonly received support questions.

VDC’s Predictions for the Embedded Market in 2011

2011 looks to be another interesting year in the embedded systems marketplace according to VDC’s predictions outlined here:

If you’ve been reading our commentary, then you know that we think they’re right on with item 5:  OEMs to increase use of web security test tools.  This just makes a world of sense given the high profile attacks where embedded systems have been used as the key attack vector. However, test tools is just a single piece of the security puzzle. Secure connectivity will be just as important as the market progresses.

Holiday wolfSSL Release 1.8.0

So what made it into the wolfSSL Holiday Release?  We think a few items that users will appreciate.  Some concern increased portability through the os_settings.h file and the new C Standard Library Abstraction layer.  Others lower memory use through configurable input/output buffer sizes and less dynamic memory use.  For the readers out there we now have a complete manual available on the website as well as in the release.  wolfSSL can now create CA signed x509v3 certificates too.  There`s also the ability to use new cipher suites in conjunction with a library we`ll be talking about soon.  Happy Holidays from the yaSSL team!

Design Consulting for Building SSL Security into Devices

You may have recently read our blog post regarding Exposed Private Keys and how you may create secure private keys for SSL-enabled devices using wolfSSL. If your application or framework needs to be secured with SSL/TLS but you are uncertain about how the optimal design of a secured system would be structured, we can help!

We offer design consulting for building SSL/TLS security into devices using wolfSSL. Our consultants can provide you with the following services:

1. Assessment:  An evaluation of your current SSL/TLS implementation. We can give you advice on your current setup and how we think you could improve upon this by using wolfSSL.

2. Design:  Looking at your system requirements and parameters we`ll work closely with you to make recommendations on how to implement wolfSSL into your application such that it provides you with optimal security.

If you would like to learn more about design consulting for building SSL into your application or device, please contact for more information.

Keep your SSL Private Keys Private

A recent blog about “Breaking SSL on Embedded Devices” has been making the rounds recently.  It`s not an attack on SSL, it`s an attack on weak private key security. Specifically, embedding a private key into firmware allows anyone to extract the key and turns an otherwise secure connection into something nothing more secure than TCP.

We have a few ideas about creating private keys for SSL enabled devices.

1. Each device acting as a server should have a unique private key, just like in the non-embedded world.

2. If the key can`t be placed onto the device before delivery, have it generated during setup.

3. If the device lacks the power to generate it`s own key during setup have the client setting up the device generate the key and send it to the device.

4. If the client lacks the ability to generate a private key have the client retrieve a unique private key over an SSL connection from the devices known website for example.

wolfSSL can be used in all of these steps to help ensure an embedded device has a secure unique private key.  That will go a long ways towards securing the SSL connection itself.

wolfSSL Maturity

We saw a post on a mailing list recently that questioned the maturity of wolfSSL.  The post came as a surprise.  We think wolfSSL is pretty mature by most standards!  Here’s our key points on wolfSSL’s maturity:
1. It is on its 29th release.
2. It has been vetted out in the open source community for 6 years. (View our community page)
3. It is distributed in over 20 million devices, based on our estimates.  That includes commercial distributions such as printers, home monitoring, VoIP phones, hubs, routers, sensors, telecom infrastructure, as well as open source projects.
Let us know what you think!  If you think wolfSSL is mature/not mature, email us at, or post to our forums.

Adding Alternative Ciphers to the wolfSSL Embedded SSL Library

wolfSSL is modular. We’ve got two key modules: wolfSSL handles all SSL needs while CTaoCrypt handles all cryptographic needs including block ciphers, stream ciphers, message digests, hashing, public key cryptography, certificates, and various helper utilities.  Our topic for this post is our crypto module CTaoCrypt. 
CTaoCrypt is our implementation of cryptography components including various block and stream ciphers that can be used underneath the SSL protocol. A complete description of our ciphers is available here:

Not all ciphers are created equally. Some are better than others, depending on the task at hand. CTaoCrypt includes the traditional and most popular block ciphers, which are DES, 3DES, and AES, and the popular stream cipher ARC4. In recent years, the European Union funded the eStream project to identify next generation stream ciphers. The project concluded in 2008. A description of the eStream project is found here: The eStream project was looking to identify ciphers that could handle high throughput requirements and/or operate well in resource constrained environments. 
High throughput and resource constrained environments (like VoIP on devices) is where wolfSSL maintains a technology lead over the pack of SSL libraries, so it was natural for us to maintain a keen interest in the results from eStream. The net result is our implementation of the HC-128 and RABBIT ciphers in wolfSSL. If you’d like to see a comparison of cipher performance, see slide 16 of our OSCON presentation, showing relative performance of the cipher suites in specific implementation of Secure Memcache. 
Other ciphers can be added to CTaoCrypt for additional purposes, and we’re happy to do it if we see a need from our customers. Watch this space for further announcements! 

More news on the Mobile Internet Tsunami – Plus thoughts on how the Tsunami drives some less visible markets

This article from Embedded Internet Design gives excellent coverage on the recent and upcoming technologies in the Mobile Internet Tsunami.  We’d like to extrapolate from the article and think about some of the less visible, less glamorous segments of the market that will change dramatically due to the innovation and investment brought about by the Tsunami. 
Here’s our thinking:
1. We agree with the article.  The waves in this Tsunami are just getting bigger and bigger.
2. The visible market driver is consumer adoption.
3. Chips, boards, and systems costs get driven down and horsepower goes up, really fast…of course.  We’re all used to that.
4. The less visible segments of the market get driven along by the investment and innovation in the Tsunami.
5. This means dramatic changes in invisible computing, and of course the security for these invisible devices.
One of the less visible markets we’ve noticed changing fast is sensors in the industrial automation, physical security, and process driven industries.  These users deploy a lot of chips, so they absolutely, positively have to be low cost designs.  That means resource constraints, low memory usage, and tight code. 
In the sensor space, 1.0 designs just did the sensing, collection and storage of data.  2.0 designs added wireless connectivity.  The 3.0 designs we’ve been involved with add security and data transmission straight to the cloud!  Not only do we think that’s cool, we think it is effective and efficient design. 
Us mobile and embedded guys live in exciting times that are changing fast!  Do you have thoughts on how the Tsunami affects the less visible parts of the embedded computing infrastructure?  Let us know what you think at

Posts navigation

1 2 3 148 149 150 151 152 153 154 159 160 161

Weekly updates


Latest Tweets