Upcoming Webinar: What you need to know about TLS 1.3

Did you miss our previous webinars on TLS 1.3 or just want to learn more? Check out our upcoming webinar on July 16th, 2020 with wolfSSL engineer Sean Parkinson on what you need to know about TLS 1.3. There will be a Q&A session that follows so please tune in!

The wolfSSL lightweight SSL/TLS library supports TLS 1.3 (RFC 8446, previously Draft 28) on both the client and server side! A few of the advantages the newest version of TLS 1.3 include:

  • Faster handshake times as there is only one RTT instead of two which enables clients to send data immediately after the first reply from the server
  • Full session encryption achieved through the use of a variety of encryption algorithms to secure data
  • Brand new cipher suites considered to be stronger than before

To learn more about the advantages of TLS 1.3 tune in to our webinar!

Registration

When: July 16th, 2020 2 PM Pacific Time (US and Canada)
Topic: TLS 1.3

If you are interested, please register in advance for this webinar:
https://us02web.zoom.us/webinar/register/WN_V535mNL2TB2klFWrttppAw
After registering, you will receive a confirmation email containing information about joining the webinar.

Looking forward to seeing you there! Not able to attend? No problem, all our webinars are recorded and uploaded to our Youtube Channel! Please contact us at facts@wolfssl.com with any questions about the webinar.

Learn More About TLS 1.3
Learn more about TLS 1.3 from the RFC. The most recent version can be found here:
https://tools.ietf.org/html/rfc8446

Or, browse some of our recent blog posts on TLS 1.3:

Support
Please direct any questions about using wolfSSL with TLS 1.3, or about our current TLS 1.3 support to support@wolfssl.com. We also appreciate any comments or feedback. Thanks!

wolfSSL supports new A12Z Bionic chip in Macs

Two weeks ago, Apple announced a transition from Intel-based Macs to their very own ‘world-class custom silicon’ chip. This marks a new era for Apple, as they further establish a common architecture throughout their product ecosystem, making it easy for developers to write, update and optimize applications.

Underlying this recent development is Apple’s Universal App Quick Start Program that includes the ‘limited use of a Developer Transition Kit (DTK), a Mac development system based on Apple’s A12Z Bionic System on a Chip (SoC)’ among other services like forums support, beta version of macOS Big Sur and Xcode 12.

So why is this important? 

wolfSSL is a direct partner with ARM, the architecture A12Z Bionic is based upon, and we fully support all the crypto extensions that are built into the new chip. We aim to have the first FIPS certificate for A12Z and will be pushing out benchmarks on the A12Z soon, so stay tuned!

For more information, please contact facts@wolfssl.com.

Additional Resources:
The most recent version of wolfSSL can be downloaded from our download page, here: https://www.wolfssl.com/download/
wolfSSL GitHub repository: https://github.com/wolfssl/wolfssl.git
Check out the latest addition of the wolfSSL ARM mbed-os Port of the wolfSSL embedded SSL/TLS library!

Fuzz Testing

All of the wolfSSL team prides themselves on offering the Best Tested SSL/TLS library on the market. wolfSSL is able to do so by conducting regular, diligent, and well-planned testing to maintain a robust and secure library. wolfSSL knows that it is impossible to test every single possible path through the software, but opts to practice an approach that is focused on lowering risk of failure. wolfSSL implements an extensive internal testing plan that not only uses automated testing but makes sure to test well-known use cases. A key process in wolfSSLs’ internal testing plan is Fuzz Testing.

What is Fuzz Testing?

Fuzz testing, also known as fuzzing, is an automated software testing technique that is conducted to reveal coding errors and security loopholes in softwares, networks, or operating systems. A fuzz test is a technique that is widely used to discover defects which otherwise would not be identified by merely using traditional functional testing methods. Fuzzing is a Black Box testing technique that bombards a library with invalid, unexpected, or random data (known as fuzz to the system) in an attempt to expose inputs that cause the system to crash, fail in unexpected ways, or leak memory. This allows wolfSSL to catch bugs that could turn into potential vulnerabilities before they are able to make it into a release!

Fuzzing at wolfSSL

wolfSSL firmly believes that if a TLS and cryptography provider does not do fuzz testing, they are extremely exposed. wolfSSL runs 7 fuzz testers internally, every night to insure the most secure library on the market. wolfSSL tests using several different software fuzzers, including an in-memory fuzzer, a network fuzzer, OSS-fuzz, libfuzzer, tlsfuzzer, and AFL.

As a testament to wolfSSLs’ commitment to security, highly respected external testers are utilized when possible, for example: Guido Vranken in Holland and Robert Horr of T-Systems in Germany (check out this post by Guido Vranken on Fuzzing for wolfSSL).

As stated in the wolfSSL 2019 Annual Report, wolfSSL is the best – tested cryptography on market, due to consistent implementation of additional fuzz testing resources from both internal and external sources.

For further details regarding the internal wolfSSL process of testing to ensure code quality and security, please reference this blog page.

If there are any specific questions about how wolfSSL tests, please contact our team at facts@wolfssl.com. If there is a desire for wolfSSL to include other SSL/TLS or crypto implementations in wolfSSL interop testing, please let the wolfSSL team know! Likewise, if users would like to include wolfSSL in their own test framework, wolfSSL would be happy to discuss!

First DO-178 SOI Audits

As a Cybersecurity company we have to make sure all of our products are state of the art. In accordance, wolfSSL is conducting Stages of Involvement (SOI) audit on our wolfCrypt product.

Last year wolfSSL added support for complete RTCA DO-178C level A certification. wolfSSL offers DO-178 wolfCrypt as a commercial off -the-shelf (COTS) solution for connected avionics applications. The primary goal of this was to provide the proper cryptographic underpinnings for secure boot and secure firmware update in commercial and military avionics. Avionics developers now have a flexible, compact, economical, high-performance COTS solution for quickly delivering FIPS 140-2 validated crypto algorithms can be used in DO-178 mode for combined FIPS 140-2/DO-178 consumption.

Any aviation system development requires Stages of Involvement (SOI) audits to review the overall software project and ensure that it complies with the objectives of DO-178. Originally, DO-178 based development did not require SOI’s, however a problem arose because of divergence between different development organizations and what the certification authorities wanted. As a result, SOI’s have become an informal de facto standard applied to most projects.

To assess compliance, there are four Stages of Involvement. The four stages are:

  1. Planning Review
  2. Design review
  3. Validation and Verification review
  4. Final Review

We have fully completed SOI #1 through #4.

For more information regarding wolfSSL, wolfCrypt, DO-178, or any additional questions, please contact facts@wolfssl.com.

Upcoming Webinar: Getting Started with wolfSSL

wolfSSL is going back to basics! Join us for our upcoming webinar on July 8th, 2020 with wolfSSL Engineering Manager, Chris Conlon. We will review best practices for compile options, build process, examples and testing to ensure your wolfSSL implementation achieves the best possible results for your project. Bring your questions and findings for the Q&A session to follow!

When: July 8th, 2020 10:00 AM Pacific Time (US and Canada)
Duration: 1 hour
Topic: Getting Started with wolfSSL

If you are new to wolfSSL, here are some of our key differentiators:

  • wolfSSL is up to 20x smaller than OpenSSL
  • First commercial implementation of TLS 1.3
  • Best tested, most secure, fastest crypto on the market with incomparable certifications and highly customizable modularity
  • Access to 24×7 support from a real team of Engineers
  • Support for the newest standards (SSL 3.0, TLS 1.0, TLS 1.1, TLS 1.2, TLS 1.3, DTLS 1.0, and DTLS 1.2, + DTLS 1.3 forthcoming)
  • Multi-platform, royalty free, with an OpenSSL compatibility API to ease porting into existing applications which have previously used the OpenSSL package

For additional support, please contact support@wolfssl.com or check out our user manual.

If you are interested, please register in advance for this webinar:
https://us02web.zoom.us/webinar/register/WN_gChcXlXdTfihIUFeSJUqqA

After registering, you will receive a confirmation email containing information about joining the webinar.

Hope to see you there!

Please contact us at facts@wolfssl.com with any questions about the webinar.

In the meanwhile, check out the wolfSSL embedded SSL/TLS library, star us on Github, and learn more about the latest TLS 1.3 is available in wolfSSL.

Upcoming Webinar: Testing cURL for Security

wolfSSL is excited to announce that we will be hosting a webinar on June 30th, 2020 with wolfSSL engineer and cURL founder Daniel Stenberg on testing, fuzzing, and CI! There will be a Q&A session that follows so stay tuned.

cURL is used in virtually every connected device for secure data transfer and Stenberg believes it may be one of the world’s most widely used open source projects. On his own blog he states some of the biggest cURL installations from Internet servers at number ten, to Netflix devices, overall listing smartphones as number one. wolfSSL currently offers commercial support on cURL which can be built with wolfCrypt FIPS and is FIPS ready. For more information on using cURL with your project, please contact support@wolfssl.com.

When: June 30, 2020 10:00 AM Pacific Time (US and Canada)
Duration: 30-40 minutes
Topic: Testing cURL for Security

If you are interested, please register in advance for this webinar:
https://us02web.zoom.us/webinar/register/WN_9Gljp2XRRNadMnoA6w-2Wg

After registering, you will receive a confirmation email containing information about joining the webinar.

Looking forward to seeing you there!

Please contact us at facts@wolfssl.com with any questions about the webinar, the wolfSSL embedded SSL/TLS library, cURL, or tinycURL!

wolfSSL libest Port

Are you interested in having the best tested cryptography ported to libest? wolfSSL has many ports to various devices and projects. We are constantly working on and expanding our collection of ports and will soon be working on porting wolfSSL/wolfCrypt into libest.

The libest project is a library that implements RFC 7030 (Enrollment over Secure Transport). EST is used to provision certificates from a CA or RA. EST is a replacement for SCEP, providing several security enhancements and support for ECC certificates. Libest is written in C and currently is set up to use OpenSSL 1.0.1.  This port will allow libest to use wolfSSL in place of OpenSSL.

If you are interested in using wolfSSL with libest, or are looking to use wolfSSL with a different open source project, contact us at facts@wolfssl.com.

Special Offer for NTLM + cURL Users

We hope everyone is enjoying this June weather. We understand due to current circumstances we have been under lockdown and cannot enjoy the weather as we have in the past. It is however a fantastic time to start a new project, or update and get proper support for your existing ones. That is why we are offering a 20% discount on support for NTLM + cURL users this June.

cURL is a computer software project providing a library for transferring data using various protocols. These protocols include (but are not limited to) FTP, FTPS, HTTP, HTTPS, and more. This version of the cURL library is nearly identical to the original library, except for a major difference: it is available for dual-licensing like many of the other wolfSSL products. Additionally, wolfSSL provides commercial curl support as well as support for wolfCrypt FIPS and FIPS ready.

NTLM authentication is a family of authentication protocols that are encompassed in the Windows Msv1_0.dll. The NTLM authentication protocols include LAN Manager version 1 and 2, and NTLM version 1 and 2. The NTLM authentication protocols authenticate users and computers based on a challenge/response mechanism that proves to a server or domain controller that a user knows the password associated with an account.

Contact us at facts@wolfssl.com to take advantage of this offer!

Upcoming Webinar: wolfBoot

Don’t miss this hot topic next week! wolfSSL Engineer Daniele Lacamera presents:

wolfBoot
Wednesday, June 24th 2020 at 10AM Pacific time (GMT-8)
Register here: https://us02web.zoom.us/webinar/register/WN_UNJ6lsUoROqJO4Q7cCN7bQ

Trusted firmware updates have become a requirement for IoT projects.

At wolfSSL, we have been developing secure boot solutions with customers for many years, and more recently we have released wolfBoot, a secure bootloader designed for embedded systems. You probably already know this. But what don’t you know about the best secure boot loader on the market?

wolfBoot provides reliable support to remote firmware updates on a wide range of devices, supporting the most common architectures. wolfBoot supports all types of RTOS and embedded operating systems. Bring questions and roadmap items to this presentation on all things wolfBoot!

We can’t wait for you to join us!

After registering, you will receive a confirmation email containing information about joining the webinar.

What questions do you have around wolfBoot? Daniele Lacamera has answers. Email us at facts@wolfssl.com with any questions.

Posts navigation

1 2 3 4 114 115 116