It has been widely publicized that TLS (any version less than or equal to 1.0), using AES-CBC mode has been recently cracked. We have received a number of questions and there has been a flurry of activity in the SSL world around this topic. Hence, we feel compelled to make a few statements of our own. Here are our thoughts:
1. The current crack is specific to TLS, versions less than or equal to 1.0. We support both TLS 1.1 and TLS 1.2.
2. We have supported TLS 1.2 for over 18 months now, and believe that we have the most robust and well tested implementation.
3. We can also note that we`ve done as much TLS 1.2 interop testing as possible.
To protect yourself from this attack, we recommend using either TLS 1.1 or TLS 1.2 in your project or application. If you must use an older version of the protocol (SSL 3.0, TLS 1.0), we recommend that you use stream ciphers, as they are not vulnerable to the CBC crack. wolfSSL supports several stream ciphers including ARC4, RABBIT, and HC-128. For a full list of wolfSSL features, please see the product page.
References on the above will follow in further posts on our blog. If you have any questions, please contact us at email@example.com.