Blog

Upcoming Webinar - Working with X.509 Keys and Certificates

Advance Your Skills in X.509 Certificate Management with OpenSSL

  • Date: Nov 21, 2024
  • Time: 04:00 PM Eastern Time (US and Canada)
  • Duration: 1 hour
  • Location: Online Webinar (link to be provided upon registration)
  • Register Here

Are you looking to deepen your understanding of X.509 keys and certificates or sharpen your command-line skills?

Join us for a comprehensive webinar on X.509 certificate management led by Viktor Dukhovni, an OpenSSL Software Engineer. This session covers essential concepts and hands-on techniques using OpenSSL’s command-line tools.

OpenSSL Forms Business Advisory Committees - Shape the Future - Join Now!

The OpenSSL Foundation (primarily focused on non-commercial communities) and the OpenSSL Corporation (primarily focused on commercial communities) are pleased to announce the formation of Business Advisory Committees (BAC), inviting our communities - Distributions, Committers, Small Businesses, Large Businesses, Individuals, and Academics - to actively engage in shaping the future of OpenSSL. These advisory bodies are critical in enhancing our governance structure, ensuring that the decisions reflect the diverse stakeholders involved and that our Mission and Values stay aligned with the community’s needs.

OpenSSL 3.4 Final Release Live

The final release of OpenSSL 3.4 is now live. We would like to thank all those who contributed to the OpenSSL 3.4 release, without whom OpenSSL would not be possible.

OpenSSL delivers the following significant new features:

  • Support for Integrity only cipher suites (RFC 9150)
  • JITTER RNG support via statically linked jitterentropy library
  • RFC 5755 Attribute Certificate support
  • FIPS indicators in support of FIPS 140-3 validation
  • Improved Base64 BIO input handling and error reporting
  • XOF Digest size reporting improvements
  • Windows Registry key-based directory lookup
  • Support for several X509v3 extensions
  • Support for position independent executables in the openssl app to support address space layout randomization

Please see the CHANGES.md file in the release for a full list of changes since OpenSSL 3.3

OpenSSL 3.4 beta released

OpenSSL 3.4 beta 1 has now been made available.

Our beta releases are considered feature complete for the release, meaning that between now and the final release, only bug fixes are expected (if any). Notable features of this release are available in NEWS.md within the source tarball.

Beta releases are provided to our communities for testing and feedback purposes. If you use OpenSSL, and particularly if you intend to upgrade to OpenSSL 3.4 when it is released, we strongly encourage you to download this beta release, and test it within whatever quality control mechanisms you have, providing feedback via our GitHub issue page at http://github.com/openssl/openssl/issues, so that we can address any shortcomings prior to the final release

OpenSSL Corporation's Silver Sponsorship at ICMC 2024 - A Retrospective

OpenSSL Corporation’s participation as a Silver Sponsor at the International Cryptographic Module Conference (ICMC) 18th - 20th September 2024 marked an important milestone in our continued commitment to advancing cryptographic technologies. As a critical player in secure communication, OpenSSL’s involvement highlighted our dedication to fostering collaboration, innovation, and security within the cryptographic community.

ICMC 2024 provided a valuable platform for industry leaders to engage in key discussions surrounding cryptographic standards, challenges, and innovations. Through our sponsorship, OpenSSL contributed to critical dialogues on post-quantum cryptography, regulatory compliance, and developing secure, open-source cryptographic solutions.

Lightship Security Partnership with OpenSSL

OpenSSL is sharing Lightship Security’s latest press release, highlighting the new partnership with the OpenSSL Corporation. Read the full release below:

Lightship Security, an Applus+ Laboratories company and a leading cryptographic security test lab, announces its agreement with the OpenSSL Corporation to provide FIPS 140-3 validation services for the OpenSSL cryptographic library.

The OpenSSL Corporation provides commercial support for users of the OpenSSL Library, a critical component of secure communications in enterprise technologies.

Post-Quantum Algorithms in OpenSSL

Recently NIST published a number of post-quantum algorithm standards (ML-KEM, ML-DSA, and SLH-DSA). With these new NIST publications, OpenSSL is now prepared for implementation.

We’ve recently been receiving a lot of questions about these new standards so we wanted to make our position clear:

  • We intend to implement support for these algorithms in our providers in a future version of OpenSSL
  • We are currently putting together our project plans for this, stay tuned for more information regarding timeline
  • We invite qualified and skilled individuals to help us implement these algorithms and integrate them into OpenSSL in accordance with our standards and policies.

From early 2022 a research project made available a test vehicle enabling TLS1.3 and X.509 support for many pre-standard and other experimental post-quantum algorithms via the OpenSSL provider interface, called oqs-provider. Its primary author and maintainer (Michael Baentsch) has now joined the OpenSSL team with the goal to support an efficient, secure, smooth and seamless integration of the now standardised post-quantum algorithms from NIST into the OpenSSL code base. Many lessons learnt from the process of building and integrating oqs-provider into downstream applications will be applied to this process.

OpenSSL 3.4 alpha released

OpenSSL 3.4 alpha 1 has now been made available.

Our Alpha releases are considered feature complete for the release, meaning that between now and the final release, only bug fixes are expected (if any). Notable features of this release are available in CHANGES.md within the source tarball.

Alpha releases are provided to our communities for testing and feedback purposes. If you use OpenSSL, and particularly if you intend to upgrade to OpenSSL 3.4 when it is released, we strongly encourage you to download this alpha release, and test it within whatever quality control mechanisms you have, providing feedback via our GitHub issue page at http://github.com/openssl/openssl/issues, so that we can address any shortcomings prior to the final release

OpenSSL considering TLS 1.0/1.1 deprecation

Recently, OpenSSL proposed the deprecation of TLS 1.0/1.1 and solicited community feedback on the idea.

Feedback on the proposal was generally split down the middle, with half of the respondents indicating immediate depreciation with near-term removal was acceptable, while the remainder of the respondents with affirmative opinions noted that they represent, or know of products whose environment disallowed updating to TLS1.2 or later, and would need to re-enable the deprecated features for the foreseeable future.

Join Our Webinar on Debugging OpenSSL Applications

Debugging is a crucial aspect of developing and maintaining reliable software. However, debugging can become particularly challenging when applications incorporate diverse and complex components like OpenSSL. This webinar is designed to help you navigate these complexities.

Webinar Details

Date: September 11, 2024
Time: 09:00 AM Pacific Time (US and Canada)
Platform: Zoom
Topic: Debugging OpenSSL Applications

Registration Link: Click here to register

What to Expect

  • Internal Debugging Tools: Learn about the facilities OpenSSL provides to help you gain visibility into its internal behavior, allowing for more effective troubleshooting.
  • External Diagnostic Tools: Explore additional tools that can be integrated with OpenSSL to diagnose and resolve more intricate issues.

For professionals dealing with OpenSSL, mastering these debugging techniques is essential to ensuring the stability and security of their applications.