No edit summary |
No edit summary |
||
Line 18: | Line 18: | ||
This should link to your home wiki page so we know who you are. | This should link to your home wiki page so we know who you are. | ||
--> | --> | ||
* Name: [[User:Fkrenzel| František Krenželok]] | * Name: [[User:Fkrenzel| František Krenželok]], [[User:Ueno| Daiki Ueno]] | ||
<!-- Include you email address that you can be reached should people want to contact you about helping with your change, status is requested, or technical issues need to be resolved. If the change proposal is owned by a SIG, please also add a primary contact person. --> | <!-- Include you email address that you can be reached should people want to contact you about helping with your change, status is requested, or technical issues need to be resolved. If the change proposal is owned by a SIG, please also add a primary contact person. --> | ||
* Email: fkrenzel@redhat.com | * Email: fkrenzel@redhat.com, dueno@redhat.com | ||
<!--- UNCOMMENT only for Changes with assigned Shepherd (by FESCo) | <!--- UNCOMMENT only for Changes with assigned Shepherd (by FESCo) | ||
* FESCo shepherd: [[User:FASAccountName| Shehperd name]] <email address> | * FESCo shepherd: [[User:FASAccountName| Shehperd name]] <email address> | ||
--> | --> | ||
== Current status == | == Current status == | ||
Line 146: | Line 142: | ||
===The following API is added=== | ===The following API is added=== | ||
To check if KTLS was properly initialized on the interfaces, [https://gnutls.org/manual/gnutls.html# | To check if KTLS was properly initialized on the interfaces, [https://gnutls.org/manual/gnutls.html#index-gnutls_005ftransport_005fis_005fktls_005fenabled see]: (it has to be invoked no earlier that after a TLS-handshake) | ||
<pre> gnutls_transport_ktls_enable_flags_t gnutls_transport_is_ktls_enabled(gnutls_session_t session);</pre> | <pre> gnutls_transport_ktls_enable_flags_t gnutls_transport_is_ktls_enabled(gnutls_session_t session);</pre> | ||
Line 185: | Line 181: | ||
== Documentation == | == Documentation == | ||
<!-- Is there upstream documentation on this change, or notes you have written yourself? Link to that material here so other interested developers can get involved. --> | <!-- Is there upstream documentation on this change, or notes you have written yourself? Link to that material here so other interested developers can get involved. --> | ||
[https://gnutls.org/manual/gnutls.html#index-gnutls_005frecord_005fsend_005ffile gnutls_record_send_file()] | |||
[https://gnutls.org/manual/gnutls.html#index-gnutls_005ftransport_005fis_005fktls_005fenabled gnutls_is_ktls_enabled()] | |||
<!-- REQUIRED FOR SYSTEM WIDE CHANGES --> | <!-- REQUIRED FOR SYSTEM WIDE CHANGES --> |
Revision as of 07:58, 8 August 2022
KTLS implementation for GnuTLS
Summary
Acceleration of GnuTLS with software Kernel TLS (KTLS)
Owner
- Name: František Krenželok, Daiki Ueno
- Email: fkrenzel@redhat.com, dueno@redhat.com
Current status
- Targeted release: Fedora Linux 38
- Last updated: 2022-08-08
- FESCo issue: <will be assigned by the Wrangler>
- Tracker bug: <will be assigned by the Wrangler>
- Release notes tracker: <will be assigned by the Wrangler>
Detailed Description
The goal of this change is to provide GnuTLS users with a high throughput data transfer mechanism on encrypted channels, with emphasis on network block devices (NBD).
We accomplish this with KTLS which offloads enc/decryption (TLS record) to the kernel, while GnuTLS handles initial connection (TLS handshake). This approach saves us from frequent context switching as well as data copies in userspace when using send_file() function.
Feedback
Benefit to Fedora
This change will affect broad spectrum of tools/packages that use GnuTLS. One of the benefits might be acceleration of live VM migration, which should mitigate the downtime for various services used by both the users and the developers.
packages that might benefit: nbdkit
qemu
Scope
- Proposal owners:
- Other developers:
- Release engineering: #Releng issue number
- Policies and guidelines: N/A (not needed for this Change)
- Trademark approval: N/A (not needed for this Change)
- Alignment with Objectives:
Upgrade/compatibility impact
This feature is completely optional. Nor developers or users will be required to do anything regarding this change unless they would like to use the feature, in which case they would follow instructions in How to test section below.
How To Test
To enable this feature, user has to load TLS kernel module (modprobe tls
) and enable ktls with crypto policies
$ cat > /etc/crypto-policies/local.d/gnutls-ktls.config <<EOF [global] ktls = true EOF
$ update-crypto-policies
The following API is added
To check if KTLS was properly initialized on the interfaces, see: (it has to be invoked no earlier that after a TLS-handshake)
gnutls_transport_ktls_enable_flags_t gnutls_transport_is_ktls_enabled(gnutls_session_t session);
To send data directly from a file descriptor in a zero-copy manner if KTLS is enabled; otherwise it will just iteratively read from the file descriptor:
ssize_t gnutls_record_send_file(gnutls_session_t session, int fd, off_t *offset, size_t count);
User Experience
This change might interest package maintainers i.e. developers that picked GnuTLS as their go to solution when it come to transferring data securely, and wish to accelerate it. The acceleration is most noticeable on large data transfer such that of files.
Dependencies
KTLS will not initialize if app uses custom push/pull callback for GnuTLS.
Currently KTLS doesn't support key_update (The keys delivered to the kernel can’t be set more than once per session) so a kernel module patch would be needed for this functionality.
Contingency Plan
- Contingency mechanism: (What to do? Who will do it?) N/A (not a System Wide Change)
- Contingency deadline: N/A (not a System Wide Change)
- Blocks release? N/A (not a System Wide Change), Yes/No
Documentation
gnutls_record_send_file() gnutls_is_ktls_enabled()
N/A (not a System Wide Change)