lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 8 Apr 2024 10:07:24 -0400
From: Jason Baron <jbaron@...mai.com>
To: Xin Long <lucien.xin@...il.com>, network dev <netdev@...r.kernel.org>
Cc: davem@...emloft.net, kuba@...nel.org, Eric Dumazet <edumazet@...gle.com>,
        Paolo Abeni <pabeni@...hat.com>, Steve French <smfrench@...il.com>,
        Namjae Jeon <linkinjeon@...nel.org>,
        Chuck Lever III
 <chuck.lever@...cle.com>,
        Jeff Layton <jlayton@...nel.org>, Sabrina Dubroca <sd@...asysnail.net>,
        Tyler Fanelli <tfanelli@...hat.com>, Pengtao He <hepengtao@...omi.com>
Subject: Re: [RFC PATCH net-next 0/5] net: In-kernel QUIC implementation with
 Userspace handshake

Hi,

This series looks very interesting- I was just wondering if you had done 
any performance testing of this vs. a userspace QUIC implementation?

Thanks,

-Jason

On 3/11/24 12:10 PM, Xin Long wrote:
> Introduction
> ============
> 
> This is an implementation of the QUIC protocol as defined in RFC9000. QUIC
> is an UDP-Based Multiplexed and Secure Transport protocol, and it provides
> applications with flow-controlled streams for structured communication,
> low-latency connection establishment, and network path migration. QUIC
> includes security measures that ensure confidentiality, integrity, and
> availability in a range of deployment circumstances.
> 
> This implementation of QUIC in the kernel space enables users to utilize
> the QUIC protocol through common socket APIs in user space. Additionally,
> kernel subsystems like SMB and NFS can seamlessly operate over the QUIC
> protocol after handshake using net/handshake APIs.
> 
> Note that In-Kernel QUIC implementation does NOT target Crypto Offload
> support for existing Userland QUICs, and Crypto Offload intended for
> Userland QUICs can NOT be utilized for Kernel consumers, such as SMB.
> Therefore, there is no conflict between In-Kernel QUIC and Crypto
> Offload for Userland QUICs.
> 
> This implementation offers fundamental support for the following RFCs:
> 
> - RFC9000 - QUIC: A UDP-Based Multiplexed and Secure Transport
> - RFC9001 - Using TLS to Secure QUIC
> - RFC9002 - QUIC Loss Detection and Congestion Control
> - RFC9221 - An Unreliable Datagram Extension to QUIC
> - RFC9287 - Greasing the QUIC Bit
> - RFC9368 - Compatible Version Negotiation for QUIC
> - RFC9369 - QUIC Version 2
> - Handshake APIs for tlshd Use - SMB/NFS over QUIC
> 
> Implementation
> ==============
> 
> The central idea is to implement QUIC within the kernel, incorporating an
> userspace handshake approach.
> 
> Only the processing and creation of raw TLS Handshake Messages, facilitated
> by a tls library like gnutls, take place in userspace. These messages are
> exchanged through sendmsg/recvmsg() mechanisms, with cryptographic details
> carried in the control message (cmsg).
> 
> The entirety of QUIC protocol, excluding TLS Handshake Messages processing
> and creation, resides in the kernel. Instead of utilizing a User Level
> Protocol (ULP) layer, it establishes a socket of IPPROTO_QUIC type (similar
> to IPPROTO_MPTCP) operating over UDP tunnels.
> 
> Kernel consumers can initiate a handshake request from kernel to userspace
> via the existing net/handshake netlink. The userspace component, tlshd from
> ktls-utils, manages the QUIC handshake request processing.
> 
> - Handshake Architecture:
> 
>        +------+  +------+
>        | APP1 |  | APP2 | ...
>        +------+  +------+
>        +-------------------------------------------------+
>        |                libquic (ktls-utils)             |<--------------+
>        |      {quic_handshake_server/client/param()}     |               |
>        +-------------------------------------------------+      +---------------------+
>          {send/recvmsg()}         {set/getsockopt()}            | tlshd (ktls-utils)  |
>          [CMSG handshake_info]    [SOCKOPT_CRYPTO_SECRET]       +---------------------+
>                                   [SOCKOPT_TRANSPORT_PARAM_EXT]
>                | ^                            | ^                        | ^
>    Userspace   | |                            | |                        | |
>    ------------|-|----------------------------|-|------------------------|-|--------------
>    Kernel      | |                            | |                        | |
>                v |                            v |                        v |
>        +--------------------------------------------------+         +-------------+
>        |  socket (IPPRTOTO_QUIC)  |       protocol        |<----+   | handshake   |
>        +--------------------------------------------------+     |   | netlink APIs|
>        | inqueue | outqueue | cong | path | connection_id |     |   +-------------+
>        +--------------------------------------------------+     |      |      |
>        |   packet   |   frame   |   crypto   |   pnmap    |     |   +-----+ +-----+
>        +--------------------------------------------------+     |   |     | |     |
>        |         input           |       output           |     |---| SMB | | NFS | ...
>        +--------------------------------------------------+     |   |     | |     |
>        |                   UDP tunnels                    |     |   +-----+ +--+--+
>        +--------------------------------------------------+     +--------------|
> 
> - Post Handshake Architecture:
> 
>        +------+  +------+
>        | APP1 |  | APP2 | ...
>        +------+  +------+
>          {send/recvmsg()}         {set/getsockopt()}
>          [CMSG stream_info]       [SOCKOPT_KEY_UPDATE]
>                                   [SOCKOPT_CONNECTION_MIGRATION]
>                                   [SOCKOPT_STREAM_OPEN/RESET/STOP_SENDING]
>                                   [...]
>                | ^                            | ^
>    Userspace   | |                            | |
>    ------------|-|----------------------------|-|----------------
>    Kernel      | |                            | |
>                v |                            v |
>        +--------------------------------------------------+
>        |  socket (IPPRTOTO_QUIC)  |       protocol        |<----+ {kernel_send/recvmsg()}
>        +--------------------------------------------------+     | {kernel_set/getsockopt()}
>        | inqueue | outqueue | cong | path | connection_id |     |
>        +--------------------------------------------------+     |
>        |   packet   |   frame   |   crypto   |   pnmap    |     |   +-----+ +-----+
>        +--------------------------------------------------+     |   |     | |     |
>        |         input           |       output           |     |---| SMB | | NFS | ...
>        +--------------------------------------------------+     |   |     | |     |
>        |                   UDP tunnels                    |     |   +-----+ +--+--+
>        +--------------------------------------------------+     +--------------|
> 
> Usage
> =====
> 
> This implementation supports a mapping of QUIC into sockets APIs. Similar
> to TCP and SCTP, a typical Server and Client use the following system call
> sequence to communicate:
> 
>         Client                    Server
>      ------------------------------------------------------------------
>      sockfd = socket(IPPROTO_QUIC)      listenfd = socket(IPPROTO_QUIC)
>      bind(sockfd)                       bind(listenfd)
>                                         listen(listenfd)
>      connect(sockfd)
>      quic_client_handshake(sockfd)
>                                         sockfd = accecpt(listenfd)
>                                         quic_server_handshake(sockfd, cert)
> 
>      sendmsg(sockfd)                    recvmsg(sockfd)
>      close(sockfd)                      close(sockfd)
>                                         close(listenfd)
> 
> Please note that quic_client_handshake() and quic_server_handshake() functions
> are currently sourced from libquic in the github lxin/quic repository, and might
> be integrated into ktls-utils in the future. These functions are responsible for
> receiving and processing the raw TLS handshake messages until the completion of
> the handshake process.
> 
> For utilization by kernel consumers, it is essential to have the tlshd service
> (from ktls-utils) installed and running in userspace. This service receives
> and manages kernel handshake requests for kernel sockets. In kernel, the APIs
> closely resemble those used in userspace:
> 
>         Client                    Server
>      ------------------------------------------------------------------------
>      __sock_create(IPPROTO_QUIC, &sock)  __sock_create(IPPROTO_QUIC, &sock)
>      kernel_bind(sock)                   kernel_bind(sock)
>                                          kernel_listen(sock)
>      kernel_connect(sock)
>      tls_client_hello_x509(args:{sock})
>                                          kernel_accept(sock, &newsock)
>                                          tls_server_hello_x509(args:{newsock})
> 
>      kernel_sendmsg(sock)                kernel_recvmsg(newsock)
>      sock_release(sock)                  sock_release(newsock)
>                                          sock_release(sock)
> 
> Please be aware that tls_client_hello_x509() and tls_server_hello_x509() are
> APIs from net/handshake/. They are employed to dispatch the handshake request
> to the userspace tlshd service and subsequently block until the handshake
> process is completed.
> 
> For advanced usage,
> see man doc: https://urldefense.com/v3/__https://github.com/lxin/quic/wiki/man__;!!GjvTz_vk!UsLPnlAN5OZvmKIETR2k4xtGO49kJw5h_my6mmoYzVfohMrtGl2Be1zG9WOV3L7scd5SspyzNzYcUkjf$
> and examples: https://urldefense.com/v3/__https://github.com/lxin/quic/tree/main/tests__;!!GjvTz_vk!UsLPnlAN5OZvmKIETR2k4xtGO49kJw5h_my6mmoYzVfohMrtGl2Be1zG9WOV3L7scd5SspyzNy4xr52Q$
> 
> The QUIC module is currently labeled as "EXPERIMENTAL".
> 
> Xin Long (5):
>    net: define IPPROTO_QUIC and SOL_QUIC constants for QUIC protocol
>    net: include quic.h in include/uapi/linux for QUIC protocol
>    net: implement QUIC protocol code in net/quic directory
>    net: integrate QUIC build configuration into Kconfig and Makefile
>    Documentation: introduce quic.rst to provide description of QUIC
>      protocol
> 
>   Documentation/networking/quic.rst |  160 +++
>   include/linux/socket.h            |    1 +
>   include/uapi/linux/in.h           |    2 +
>   include/uapi/linux/quic.h         |  189 +++
>   net/Kconfig                       |    1 +
>   net/Makefile                      |    1 +
>   net/quic/Kconfig                  |   34 +
>   net/quic/Makefile                 |   20 +
>   net/quic/cong.c                   |  229 ++++
>   net/quic/cong.h                   |   84 ++
>   net/quic/connection.c             |  172 +++
>   net/quic/connection.h             |  117 ++
>   net/quic/crypto.c                 |  979 ++++++++++++++++
>   net/quic/crypto.h                 |  140 +++
>   net/quic/frame.c                  | 1803 ++++++++++++++++++++++++++++
>   net/quic/frame.h                  |  162 +++
>   net/quic/hashtable.h              |  125 ++
>   net/quic/input.c                  |  693 +++++++++++
>   net/quic/input.h                  |  169 +++
>   net/quic/number.h                 |  174 +++
>   net/quic/output.c                 |  638 ++++++++++
>   net/quic/output.h                 |  194 +++
>   net/quic/packet.c                 | 1179 +++++++++++++++++++
>   net/quic/packet.h                 |   99 ++
>   net/quic/path.c                   |  434 +++++++
>   net/quic/path.h                   |  131 +++
>   net/quic/pnmap.c                  |  217 ++++
>   net/quic/pnmap.h                  |  134 +++
>   net/quic/protocol.c               |  711 +++++++++++
>   net/quic/protocol.h               |   56 +
>   net/quic/sample_test.c            |  339 ++++++
>   net/quic/socket.c                 | 1823 +++++++++++++++++++++++++++++
>   net/quic/socket.h                 |  293 +++++
>   net/quic/stream.c                 |  248 ++++
>   net/quic/stream.h                 |  147 +++
>   net/quic/timer.c                  |  241 ++++
>   net/quic/timer.h                  |   29 +
>   net/quic/unit_test.c              | 1024 ++++++++++++++++
>   38 files changed, 13192 insertions(+)
>   create mode 100644 Documentation/networking/quic.rst
>   create mode 100644 include/uapi/linux/quic.h
>   create mode 100644 net/quic/Kconfig
>   create mode 100644 net/quic/Makefile
>   create mode 100644 net/quic/cong.c
>   create mode 100644 net/quic/cong.h
>   create mode 100644 net/quic/connection.c
>   create mode 100644 net/quic/connection.h
>   create mode 100644 net/quic/crypto.c
>   create mode 100644 net/quic/crypto.h
>   create mode 100644 net/quic/frame.c
>   create mode 100644 net/quic/frame.h
>   create mode 100644 net/quic/hashtable.h
>   create mode 100644 net/quic/input.c
>   create mode 100644 net/quic/input.h
>   create mode 100644 net/quic/number.h
>   create mode 100644 net/quic/output.c
>   create mode 100644 net/quic/output.h
>   create mode 100644 net/quic/packet.c
>   create mode 100644 net/quic/packet.h
>   create mode 100644 net/quic/path.c
>   create mode 100644 net/quic/path.h
>   create mode 100644 net/quic/pnmap.c
>   create mode 100644 net/quic/pnmap.h
>   create mode 100644 net/quic/protocol.c
>   create mode 100644 net/quic/protocol.h
>   create mode 100644 net/quic/sample_test.c
>   create mode 100644 net/quic/socket.c
>   create mode 100644 net/quic/socket.h
>   create mode 100644 net/quic/stream.c
>   create mode 100644 net/quic/stream.h
>   create mode 100644 net/quic/timer.c
>   create mode 100644 net/quic/timer.h
>   create mode 100644 net/quic/unit_test.c
> 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ