No edit summary |
mNo edit summary |
||
Line 57: | Line 57: | ||
== Benefit to Fedora == | == Benefit to Fedora == | ||
The improvement lies in acceleration of large data transfer trough encrypted channels. | |||
The send_file function enables us to send data directly trough socket without entering user space, saving us from 2 context switches and 2 additional buffers. This is especially useful for NBD | |||
One of the benefits might be acceleration of ''live VM migration'', which should mitigate the downtime for various services used by both the users and the developers. | One of the benefits might be acceleration of ''live VM migration'', which should mitigate the downtime for various services used by both the users and the developers. | ||
packages that might benefit: {{package|nbdkit}} {{package|qemu}} | packages that might benefit: {{package|nbd}} {{package|nbdkit}} {{package|qemu}} | ||
== Scope == | == Scope == | ||
Line 110: | Line 85: | ||
== Upgrade/compatibility impact == | == Upgrade/compatibility impact == | ||
Although this feature will be enabled by default, users will not notice any change, as in case of failure to initialize KTLS, GnuTLS will default to the currently used mode of operation. | |||
== How To Test == | == How To Test == | ||
'''To enable this feature user has to:''' | |||
# load TLS kernel module (`modprobe tls`) | |||
# enable ktls with crypto policies | |||
{{admon/note|Once proposal accepted|KTLS will be enabled by default and this step will not be needed.}} | |||
To enable this feature | |||
<pre>$ cat > /etc/crypto-policies/local.d/gnutls-ktls.config <<EOF | <pre>$ cat > /etc/crypto-policies/local.d/gnutls-ktls.config <<EOF | ||
[global] | [global] | ||
Line 140: | Line 98: | ||
</pre> | </pre> | ||
<pre>$ update-crypto-policies</pre> | <pre>$ update-crypto-policies</pre> | ||
{{admon/important||KTLS will not initialize if app uses custom push/pull callback for GnuTLS.}} | |||
== User Experience == | == User Experience == | ||
This change should accelerate large data transfers especially that of files. | |||
This will affect users that use applications which utilize GnuTLS for encrypting communication channels. | |||
== Dependencies == | == Dependencies == | ||
Currently KTLS doesn't support key_update (The keys delivered to the kernel can’t be set more than once per session) so a kernel module patch would be needed for this functionality. | Currently KTLS doesn't support key_update (The keys delivered to the kernel can’t be set more than once per session) so a kernel module patch would be needed for this functionality. | ||
== Contingency Plan == | == Contingency Plan == | ||
<!-- If you cannot complete your feature by the final development freeze, what is the backup plan? This might be as simple as "Revert the shipped configuration". Or it might not (e.g. rebuilding a number of dependent packages). If you feature is not completed in time we want to assure others that other parts of Fedora will not be in jeopardy. --> | <!-- If you cannot complete your feature by the final development freeze, what is the backup plan? This might be as simple as "Revert the shipped configuration". Or it might not (e.g. rebuilding a number of dependent packages). If you feature is not completed in time we want to assure others that other parts of Fedora will not be in jeopardy. --> | ||
* Contingency mechanism: (What to do? Who will do it?) N/A (not a System Wide Change) <!-- REQUIRED FOR SYSTEM WIDE CHANGES --> | * Contingency mechanism: (What to do? Who will do it?) N/A (not a System Wide Change) <!-- REQUIRED FOR SYSTEM WIDE CHANGES --> | ||
Line 177: | Line 114: | ||
<!-- Does finishing this feature block the release, or can we ship with the feature in incomplete state? --> | <!-- Does finishing this feature block the release, or can we ship with the feature in incomplete state? --> | ||
* Blocks release? N/A (not a System Wide Change), Yes/No <!-- REQUIRED FOR SYSTEM WIDE CHANGES --> | * Blocks release? N/A (not a System Wide Change), Yes/No <!-- REQUIRED FOR SYSTEM WIDE CHANGES --> | ||
== Documentation == | == Documentation == | ||
=== API === | |||
[https://gnutls.org/manual/gnutls.html#index- | '''[https://gnutls.org/manual/gnutls.html#index-gnutls_005ftransport_005fis_005fktls_005fenabled gnutls_transport_is_ktls_enabled()]''' | ||
[https://gnutls.org/manual/gnutls.html#index- | To check if KTLS was properly initialized on the interfaces: | ||
{{admon/important||it has to be invoked no earlier that after a TLS-handshake}} | |||
<pre> gnutls_transport_ktls_enable_flags_t gnutls_transport_is_ktls_enabled(gnutls_session_t session);</pre> | |||
'''[https://gnutls.org/manual/gnutls.html#index-gnutls_005frecord_005fsend_005ffile gnutls_record_send_file()]''' | |||
To send data directly from a file descriptor in a zero-copy manner if KTLS is enabled; otherwise it will just iteratively read from the file descriptor: | |||
<pre> ssize_t gnutls_record_send_file(gnutls_session_t session, int fd, off_t *offset, size_t count);</pre> | |||
<!-- REQUIRED FOR SYSTEM WIDE CHANGES --> | <!-- REQUIRED FOR SYSTEM WIDE CHANGES --> |
Revision as of 15:47, 10 August 2022
KTLS implementation for GnuTLS
Summary
Acceleration of GnuTLS with software Kernel TLS (KTLS)
Owner
- Name: František Krenželok, Daiki Ueno
- Email: fkrenzel@redhat.com, dueno@redhat.com
Current status
- Targeted release: Fedora Linux 38
- Last updated: 2022-08-10
- FESCo issue: <will be assigned by the Wrangler>
- Tracker bug: <will be assigned by the Wrangler>
- Release notes tracker: <will be assigned by the Wrangler>
Detailed Description
The goal of this change is to provide GnuTLS users with a high throughput data transfer mechanism on encrypted channels, with emphasis on network block devices (NBD).
We accomplish this with KTLS which offloads enc/decryption (TLS record) to the kernel, while GnuTLS handles initial connection (TLS handshake). This approach saves us from frequent context switching as well as data copies in userspace when using send_file() function.
Feedback
Benefit to Fedora
The improvement lies in acceleration of large data transfer trough encrypted channels. The send_file function enables us to send data directly trough socket without entering user space, saving us from 2 context switches and 2 additional buffers. This is especially useful for NBD
One of the benefits might be acceleration of live VM migration, which should mitigate the downtime for various services used by both the users and the developers.
packages that might benefit: nbd
nbdkit
qemu
Scope
- Proposal owners:
- Other developers:
- Release engineering: #Releng issue number
- Policies and guidelines: N/A (not needed for this Change)
- Trademark approval: N/A (not needed for this Change)
- Alignment with Objectives:
Upgrade/compatibility impact
Although this feature will be enabled by default, users will not notice any change, as in case of failure to initialize KTLS, GnuTLS will default to the currently used mode of operation.
How To Test
To enable this feature user has to:
- load TLS kernel module (
modprobe tls
) - enable ktls with crypto policies
$ cat > /etc/crypto-policies/local.d/gnutls-ktls.config <<EOF [global] ktls = true EOF
$ update-crypto-policies
User Experience
This change should accelerate large data transfers especially that of files. This will affect users that use applications which utilize GnuTLS for encrypting communication channels.
Dependencies
Currently KTLS doesn't support key_update (The keys delivered to the kernel can’t be set more than once per session) so a kernel module patch would be needed for this functionality.
Contingency Plan
- Contingency mechanism: (What to do? Who will do it?) N/A (not a System Wide Change)
- Contingency deadline: N/A (not a System Wide Change)
- Blocks release? N/A (not a System Wide Change), Yes/No
Documentation
API
gnutls_transport_is_ktls_enabled() To check if KTLS was properly initialized on the interfaces:
gnutls_transport_ktls_enable_flags_t gnutls_transport_is_ktls_enabled(gnutls_session_t session);
gnutls_record_send_file() To send data directly from a file descriptor in a zero-copy manner if KTLS is enabled; otherwise it will just iteratively read from the file descriptor:
ssize_t gnutls_record_send_file(gnutls_session_t session, int fd, off_t *offset, size_t count);
N/A (not a System Wide Change)