-
Notifications
You must be signed in to change notification settings - Fork 127
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Bug fix, README & v0.6.18 Version update.
- Fix Chachapoly TLS1.2 Keep alive issue. Signed-off-by: Yogaraj Alamenda <[email protected]>
- Loading branch information
1 parent
ea2f554
commit c3e319b
Showing
9 changed files
with
75 additions
and
52 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,60 +1,77 @@ | ||
## Limitations | ||
|
||
* When forking within an application it is not valid for a cryptographic | ||
* When **forking** within an application it is not valid for a cryptographic | ||
operation to be started in the parent process, and completed in the child | ||
process. | ||
* Only one level of forking is permitted, if a child process forks again then | ||
* Only **one level of forking is permitted**, if a child process forks again then | ||
the Intel® QAT OpenSSL\* Engine will not be available in that forked | ||
process. | ||
* Event driven mode of polling operation is not supported in the FreeBSD | ||
* **Event driven mode** of polling operation is not supported in the FreeBSD | ||
Operating system or in the qatlib RPM. | ||
* qat_contig_mem memory driver is not supported when running under FreeBSD | ||
* **qat_contig_mem** memory driver is not supported when running under FreeBSD | ||
Operating system or in the qatlib RPM. The default is to use the USDM memory | ||
driver supplied as part of the Intel® QAT Driver. | ||
* **SM2, SM3 & SM4** application testing is done using BabaSSL only since OpenSSL | ||
doesn't support SMx cipher suites. | ||
* QAT Engine doesn't support **ENCRYPT_THEN_MAC**(default) mode of operation meaning | ||
when Encrypt then MAC is negotiated for symmetric ciphers say AES-CBC, the requests will not | ||
get offloaded via QAT_HW, instead uses OpenSSL SW. Disable ENCRYPT_THEN_MAC with the flag | ||
`SSL_OP_NO_ENCRYPT_THEN_MAC` programmatically using SSL_CTX_set_options() to offload | ||
symmetric chained ciphers via QAT_HW. Please note disabling ENCRYPT_THEN_MAC has security | ||
implications. | ||
* Support for cipher AES-128-CBC-HMAC-SHA1 and its related ciphers was broken | ||
in release OpenSSL\* 1.1.1d. This was later fixed in OpenSSL\* 1.1.1e release. | ||
* X25519/X448 support is available only from version 4.9 of the Intel® QAT | ||
* OpenSSL 1.1.1n introduced misleading error message(undefined symbol: **EVP_PKEY_get_base_id**) | ||
during engine load which can be ignored as it is not a real failure. This is later fixed in | ||
OpenSSL\* 1.1.1o release. | ||
* X25519/X448 support is available only from **version 4.9** of the Intel® QAT | ||
driver for Linux. Use `--disable-qat_hw_ecx` in the Intel® QAT OpenSSL\* Engine | ||
configure when building against earlier versions of the Linux driver. | ||
* Support for qaeMemFreeNonZeroNUMA() USDM API is available only from version 4.10 | ||
* Support for qaeMemFreeNonZeroNUMA() USDM API is available only from **version 4.10** | ||
of the Intel® QAT driver for Linux. Use `--with-cc-opt="-DQAT_HW_DISABLE_NONZERO_MEMFREE"` | ||
in the Intel® QAT OpenSSL\* Engine configuration when building against earlier | ||
versions of the Linux driver. | ||
* Support for QAT HW ECX, QAT SW ECX, QAT SW SM2 ECDSA, QAT HW PRF and QAT HW HKDF is disabled | ||
* From **version 4.19** of Intel® QAT driver for Linux, legacy or insecure algorithms such as DES, | ||
3DES, MD5, SHA1, RC4 are disabled by default so there will be failures observed in the relevant | ||
ciphers. Driver needs to be built with flag "--enable-legacy-algorithms" to enable those algorithms | ||
support. | ||
* QAT Engine built for OpenSSL3.0 is only compatible with dependant libraries also linked with OpenSSL3.0 | ||
libraries due to [OpenSSL#17112][1]. Same applies for OpenSSL 1.1.1. | ||
|
||
## Known Issues | ||
|
||
### Functional | ||
* Known issue with OpenSSL 3.0 s_server using qatengine with cipher **"DHE-RSA-CHACHA20-POLY1305"** which | ||
works fine with Nginx. The issue is due to failure at EVP_PKEY_copy_parameter() in OpenSSL. | ||
* AES-CBC-HMAC-SHA chained ciphers does not support **pipeline feature** when built with | ||
OpenSSL 3.0 as the corresponding support is not available in OpenSSL 3.0 - [OpenSSL#18298][2] | ||
* Support for **QAT HW ECX, QAT SW ECX, QAT SW SM2 ECDSA, QAT HW PRF and QAT HW HKDF** is disabled | ||
when built against OpenSSL 3.0 engine interface since OpenSSL doesn't have default implementation | ||
methods accessible from OpenSSL3.0 engine interface, instead it uses non-accelerated | ||
implementation from OpenSSL default provider. | ||
* There is known performance scaling issue (performance drop with threads >32) | ||
with ECDSA Ciphers in the QAT Software acceleration using multithread mode | ||
in the Haproxy application. This issue is not observed when using RSA ciphers | ||
or in multi-process mode. | ||
* There is an issue in sshd daemon application when using the QAT for default openssl. | ||
implementation from OpenSSL default provider - [OpenSSL#19047][3] | ||
* There is an issue in **sshd** daemon application when using the QAT for default openssl. | ||
sshd looks to be closing the file descriptors associated with QAT engine and driver after | ||
initialising openssl. Similar issue was present which prevents the ability to ssh out of | ||
the system using the QAT engine in versions of the ssh application before OpenSSH 8.7. | ||
The issue has been fixed with this commit [c9f7bba][1] . This update can be applied to | ||
The issue has been fixed with this commit [c9f7bba][4] . This update can be applied to | ||
sshd to work-around the issue. | ||
* SM2 ECDH and ECDSA application testing is done using BabaSSL only since OpenSSL | ||
doesn't support SMx cipher suites. | ||
* SM3 is disabled by default due to performance drop observed in mulithread scenario | ||
for all ciphers suites due to the locks at engine_table_select in OpenSSL. | ||
* OpenSSL 1.1.1n introduced misleading error message(undefined symbol: EVP_PKEY_get_base_id) | ||
during engine load which can be ignored as it is not a real failure. This is later fixed in | ||
OpenSSL\* 1.1.1o release. | ||
* AES-CBC-HMAC-SHA chained ciphers does not support pipeline feature when built with | ||
OpenSSL 3.0 as the corresponding support is not available in OpenSSL 3.0. | ||
* QAT Engine doesn't support ENCRYPT_THEN_MAC(default) mode of operation meaning | ||
when Encrypt then MAC is negotiated for symmetric ciphers say AES-CBC, the requests will not | ||
get offloaded via QAT_HW, instead uses OpenSSL SW. Disable ENCRYPT_THEN_MAC with the flag | ||
`SSL_OP_NO_ENCRYPT_THEN_MAC` programmatically using SSL_CTX_set_options() to offload | ||
symmetric chained ciphers via QAT_HW. Please note disabling ENCRYPT_THEN_MAC has security | ||
implications. | ||
* Known issue with OpenSSL 3.0 s_server using qatengine with cipher "DHE-RSA-CHACHA20-POLY1305" which | ||
works fine with Nginx. The issue is due to failure at EVP_PKEY_copy_parameter() in OpenSSL which is | ||
yet to be root caused. | ||
* From version 4.19 of Intel® QAT driver for Linux, legacy or insecure algorithms such as DES, | ||
3DES, MD5, SHA1, RC4 are disabled by default so there will be failures observed in the relevant | ||
ciphers. Driver needs to be built with flag "--enable-legacy-algorithms" to enable those algorithms | ||
support. | ||
* Failures with QAT_HW SHA3 for 0 bytes file, Big file with multiple SHA3 update and | ||
HMAC with SHA3. | ||
* Known issue with QAT_SW SM2 in ntls mode since QAT_SW SM2 doesn't have plain sign and | ||
verify operation support in engine. Disable QAT_SW SM2 to workaround the issue with ntls. | ||
No issues with TLS mode since it uses digestsign and digestverify which is supported. | ||
|
||
### Performance | ||
* There is known performance scaling issue (performance drop with threads >32) | ||
with ECDSA Ciphers in the QAT Software acceleration using multithread mode | ||
in the Haproxy application. This issue is not observed when using RSA ciphers | ||
or in multi-process mode. | ||
* SM3 is disabled by default due to performance drop observed in **mulithread scenario** | ||
for all ciphers suites due to the additional locks at engine_table_select introduced by | ||
engine digest registration in OpenSSL - [OpenSSL#18509][5] | ||
|
||
[1]:https://github.com/openssh/openssh-portable/commit/c9f7bba2e6f70b7ac1f5ea190d890cb5162ce127 | ||
[1]:https://github.com/openssl/openssl/pull/17112 | ||
[2]:https://github.com/openssl/openssl/issues/18298 | ||
[3]:https://github.com/openssl/openssl/issues/19047 | ||
[4]:https://github.com/openssh/openssh-portable/commit/c9f7bba2e6f70b7ac1f5ea190d890cb5162ce127 | ||
[5]:https://github.com/openssl/openssl/issues/18509 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -4,7 +4,7 @@ | |
%global enginesdir %(pkg-config --variable=enginesdir libcrypto) | ||
|
||
Name: qatengine-sw | ||
Version: 0.6.17 | ||
Version: 0.6.18 | ||
Release: 1%{?dist} | ||
Summary: Intel QuickAssist Technology (QAT) OpenSSL Engine | ||
# Most of the source code is BSD, with the following exceptions: | ||
|
@@ -49,6 +49,9 @@ autoreconf -ivf | |
%exclude %{enginesdir}/qatengine.la | ||
|
||
%changelog | ||
* Thu Dec 08 2022 Yogaraj Alamenda <[email protected]> - 0.6.18-1 | ||
- Update to qatengine v0.6.18 | ||
|
||
* Wed Nov 02 2022 Yogaraj Alamenda <[email protected]> - 0.6.17-1 | ||
- Update to qatengine v0.6.17 | ||
|
||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -4,7 +4,7 @@ | |
%global enginesdir %(pkg-config --variable=enginesdir libcrypto) | ||
|
||
Name: qatengine | ||
Version: 0.6.17 | ||
Version: 0.6.18 | ||
Release: 1%{?dist} | ||
Summary: Intel QuickAssist Technology (QAT) OpenSSL Engine | ||
# Most of the source code is BSD, with the following exceptions: | ||
|
@@ -46,6 +46,9 @@ autoreconf -ivf | |
%exclude %{enginesdir}/qatengine.la | ||
|
||
%changelog | ||
* Thu Dec 08 2022 Yogaraj Alamenda <[email protected]> - 0.6.18-1 | ||
- Update to qatengine v0.6.18 | ||
|
||
* Wed Nov 02 2022 Yogaraj Alamenda <[email protected]> - 0.6.17-1 | ||
- Update to qatengine v0.6.17 | ||
|
||
|