SlideShare a Scribd company logo
SSL-TLS Certificate Cachingonmulticore
Optimizations for SSL-TLS Certificate Cachingon
multicore
SSL-TLS Certificate Cachingonmulticore
Introduction
Technological advancementinmobility sectorhasledtouse of smarterappliancesandservicesforday
to day taskand chores.Thishas ledto increase tonetworktrafficinVPN connectionsacrossthe globe in
the last decade.Withrise of demandin faster,mobile andlessgeographical constraintworkplace;
trafficcontenthas movedfromprivate topublicdomainaccess.Sharingorconnectingtopublicdomain
alsoexposesthe system toattackson Webclientandserver infrastructures.
Thisbringsin the needtomonitorthe trafficbothinboundandoutboundfromsecure container(canbe
eitherClientorServerservices).Thiscanbe done efficientlybyemployingIDSorIPSon the varyinglive
traffic(1G to 20G) basedon connections,contentsize,bandwidthetc...
Abstract
Thiswhite paperexaminesvarious optimizationsoncertificate cachinglogiconmulticore forTCP-SSL
Proxyservice tocater to 20G line rate processingforanaverage of 30000 connections/sec. Italso
summarizesvariousapproachesanditsbenefitsandpitfallsexploredbefore implementingthe final
solutiontoo.
Issue
In SSL proxywebclientscanrequestforwebpagessupportedminimumof 3 or more certificatesper
connection.GeneratingcertificatesforeachproxySSLwill seriouslydeteriorate performance of
Interceptiondevice inplace. Ideal wayoutistocache the certificatesrecentlygenerated.Reuse the
validcertificate (if fieldsof originalcertificate remainssame, certificateisnotrevoked,TIBhasnot
expired).
SSL-TLS Certificate Cachingonmulticore
Followingreasonscanadverselyaffectcachingperformance
1. Requestforsame webpage fromdifferentconnectionswillbe placedondifferentthreads
(processingcores) aspartof concurrency.
2. All threads(processingcores) cangenerate certificateswithsame contenttobe cachedleading
to cache space congestion.
3. Same certificate mightbe used informultipleIPof webservers(DNSallow same service to
available forsame webservercontent). GeneratingandCache perIPwill be costlyandmemory
hogging.
4. Cleanupof cache can be periodicorthresholddriven,there are chanceswithinthe time period
requestforCertificate lookupwill yieldastale cachedcertificate.
5. Lookupfor certificate istime bounded,increase intime complexitywillbe TLS-SSLconnection
termination.
Solution
To addressabove issuesfollowingideaswere developedfromgroundup
1. Allowcreationof newcertificatesoneachSSLprocessingcores.
2. Allowpercore fixedqueuetoholdcertificate descriptor(IP,Serial Number,DigestInfoand
PointertoCertificate inmemory).
3. Run Certificate managementlogiconsingle thread(representing single processingcore);which
scans fornewcertificate descriptorforSSLcores,checksthe contentsare valid,markcached
certificate againstrevocationlist,periodicflushthe invalidcertificatefromcache oncongestion
or periodictime out.
4. Place certificate lookupinindex basedhash-arraylookupforcertificate.Whichdeliversindex to
certificate buffermemoryfromhuge page.
5. Use of vector ISA reducestime incalculatinghashesandindexforlookup.
SSL-TLS Certificate Cachingonmulticore
Application
Future Roadmap
 Port the solutionfromRISCmulticore toMIPS,PPCand ARMsolutionsforSSLproxy.
Conclusion
Utilizingmulticoreandoptimizationtechniquesspecifictothe probleminhand;we were able to
accelerate certificate cachingandlookupwithsimpleandpragmaticoptimizations.
0
5000
10000
15000
20000
25000
30000
35000
1024 2048 4096
8000
3400
1200
30500
12000
7500
CONNECTIONPERSEC
KEY SIZE
Performance Comparision
Generated Cached

More Related Content

Similar to Optimizations for ssl tls certificate caching on multicore

How to Re-evaluate Your MPLS Service Provider
How to Re-evaluate Your MPLS Service ProviderHow to Re-evaluate Your MPLS Service Provider
How to Re-evaluate Your MPLS Service Provider
Idan Hershkovich
 
How to implement mpls
How to implement mplsHow to implement mpls
How to implement mpls
Thesis Scientist Private Limited
 
Fast i pv4 lookup using local memory
Fast i pv4 lookup using local memoryFast i pv4 lookup using local memory
Fast i pv4 lookup using local memory
Vipin Varghese
 
A log based approach to make digital forensics easier on cloud computing
A log based approach to make digital forensics easier on cloud computingA log based approach to make digital forensics easier on cloud computing
A log based approach to make digital forensics easier on cloud computing
JPINFOTECH JAYAPRAKASH
 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco Canada
 
Performance Analysis of TLS Web Servers
Performance Analysis of TLS Web ServersPerformance Analysis of TLS Web Servers
Performance Analysis of TLS Web Serverswebhostingguy
 
Secure Sockets Layer(SSL)Certificate
Secure Sockets Layer(SSL)CertificateSecure Sockets Layer(SSL)Certificate
Secure Sockets Layer(SSL)Certificate
CheapSSLUSA
 
Overlay Network Overview
Overlay Network OverviewOverlay Network Overview
Overlay Network Overview
Devang Badrakiya
 
Network virtualization
Network virtualizationNetwork virtualization
Network virtualization
ronpoul
 
RedSplice_Network_Traffic_Examiner_Datasheet
RedSplice_Network_Traffic_Examiner_DatasheetRedSplice_Network_Traffic_Examiner_Datasheet
RedSplice_Network_Traffic_Examiner_DatasheetLaurentiu Nicula
 
Report on the sky x technology.
Report on the sky x technology.Report on the sky x technology.
Report on the sky x technology.
Udirmaan Deka
 
Advanced Networking: The Critical Path for HPC, Cloud, Machine Learning and more
Advanced Networking: The Critical Path for HPC, Cloud, Machine Learning and moreAdvanced Networking: The Critical Path for HPC, Cloud, Machine Learning and more
Advanced Networking: The Critical Path for HPC, Cloud, Machine Learning and more
inside-BigData.com
 
Renaissance in vm network connectivity
Renaissance in vm network connectivityRenaissance in vm network connectivity
Renaissance in vm network connectivity
IT Brand Pulse
 
Multi fabric sales motions jg v3
Multi fabric sales motions jg v3Multi fabric sales motions jg v3
Multi fabric sales motions jg v3
Jeff Green
 
A Comparative Research on SSL VPN and IPSec VPN
A Comparative Research on SSL VPN and IPSec VPNA Comparative Research on SSL VPN and IPSec VPN
A Comparative Research on SSL VPN and IPSec VPN
ijtsrd
 
sky-xpranav-140418121657-phpapp01.pptx
sky-xpranav-140418121657-phpapp01.pptxsky-xpranav-140418121657-phpapp01.pptx
sky-xpranav-140418121657-phpapp01.pptx
PrasannaKumarpanda2
 
Software Defined Networks
Software Defined NetworksSoftware Defined Networks
Software Defined Networks
Pradeep Kumar TS
 
Software Defined Networking - 1
Software Defined Networking - 1Software Defined Networking - 1
Software Defined Networking - 1
Pradeep Kumar TS
 

Similar to Optimizations for ssl tls certificate caching on multicore (20)

How to Re-evaluate Your MPLS Service Provider
How to Re-evaluate Your MPLS Service ProviderHow to Re-evaluate Your MPLS Service Provider
How to Re-evaluate Your MPLS Service Provider
 
How to implement mpls
How to implement mplsHow to implement mpls
How to implement mpls
 
Fast i pv4 lookup using local memory
Fast i pv4 lookup using local memoryFast i pv4 lookup using local memory
Fast i pv4 lookup using local memory
 
A log based approach to make digital forensics easier on cloud computing
A log based approach to make digital forensics easier on cloud computingA log based approach to make digital forensics easier on cloud computing
A log based approach to make digital forensics easier on cloud computing
 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
 
Performance Analysis of TLS Web Servers
Performance Analysis of TLS Web ServersPerformance Analysis of TLS Web Servers
Performance Analysis of TLS Web Servers
 
Secure Sockets Layer(SSL)Certificate
Secure Sockets Layer(SSL)CertificateSecure Sockets Layer(SSL)Certificate
Secure Sockets Layer(SSL)Certificate
 
Overlay Network Overview
Overlay Network OverviewOverlay Network Overview
Overlay Network Overview
 
Network virtualization
Network virtualizationNetwork virtualization
Network virtualization
 
RedSplice_Network_Traffic_Examiner_Datasheet
RedSplice_Network_Traffic_Examiner_DatasheetRedSplice_Network_Traffic_Examiner_Datasheet
RedSplice_Network_Traffic_Examiner_Datasheet
 
Report on the sky x technology.
Report on the sky x technology.Report on the sky x technology.
Report on the sky x technology.
 
Daniel künzli net scaler 10
Daniel künzli net scaler 10Daniel künzli net scaler 10
Daniel künzli net scaler 10
 
Advanced Networking: The Critical Path for HPC, Cloud, Machine Learning and more
Advanced Networking: The Critical Path for HPC, Cloud, Machine Learning and moreAdvanced Networking: The Critical Path for HPC, Cloud, Machine Learning and more
Advanced Networking: The Critical Path for HPC, Cloud, Machine Learning and more
 
Renaissance in vm network connectivity
Renaissance in vm network connectivityRenaissance in vm network connectivity
Renaissance in vm network connectivity
 
Multi fabric sales motions jg v3
Multi fabric sales motions jg v3Multi fabric sales motions jg v3
Multi fabric sales motions jg v3
 
A Comparative Research on SSL VPN and IPSec VPN
A Comparative Research on SSL VPN and IPSec VPNA Comparative Research on SSL VPN and IPSec VPN
A Comparative Research on SSL VPN and IPSec VPN
 
sky-xpranav-140418121657-phpapp01.pptx
sky-xpranav-140418121657-phpapp01.pptxsky-xpranav-140418121657-phpapp01.pptx
sky-xpranav-140418121657-phpapp01.pptx
 
Software Defined Networks
Software Defined NetworksSoftware Defined Networks
Software Defined Networks
 
Software Defined Networking - 1
Software Defined Networking - 1Software Defined Networking - 1
Software Defined Networking - 1
 
Ip virtual leased line
Ip virtual leased lineIp virtual leased line
Ip virtual leased line
 

More from Vipin Varghese

Dynamic user trace
Dynamic user traceDynamic user trace
Dynamic user trace
Vipin Varghese
 
Dpdk applications
Dpdk applicationsDpdk applications
Dpdk applications
Vipin Varghese
 
Debug dpdk process bottleneck & painpoints
Debug dpdk process bottleneck & painpointsDebug dpdk process bottleneck & painpoints
Debug dpdk process bottleneck & painpoints
Vipin Varghese
 
Debug generic process
Debug generic processDebug generic process
Debug generic process
Vipin Varghese
 
Dpdk – IoT packet analyzer
Dpdk – IoT packet analyzerDpdk – IoT packet analyzer
Dpdk – IoT packet analyzer
Vipin Varghese
 
Mmap failure analysis
Mmap failure analysisMmap failure analysis
Mmap failure analysis
Vipin Varghese
 
Dpdk frame pipeline for ips ids suricata
Dpdk frame pipeline for ips ids suricataDpdk frame pipeline for ips ids suricata
Dpdk frame pipeline for ips ids suricata
Vipin Varghese
 
Poll mode driver integration into dpdk
Poll mode driver integration into dpdkPoll mode driver integration into dpdk
Poll mode driver integration into dpdk
Vipin Varghese
 
DPDK layer for porting IPS-IDS
DPDK layer for porting IPS-IDSDPDK layer for porting IPS-IDS
DPDK layer for porting IPS-IDS
Vipin Varghese
 

More from Vipin Varghese (9)

Dynamic user trace
Dynamic user traceDynamic user trace
Dynamic user trace
 
Dpdk applications
Dpdk applicationsDpdk applications
Dpdk applications
 
Debug dpdk process bottleneck & painpoints
Debug dpdk process bottleneck & painpointsDebug dpdk process bottleneck & painpoints
Debug dpdk process bottleneck & painpoints
 
Debug generic process
Debug generic processDebug generic process
Debug generic process
 
Dpdk – IoT packet analyzer
Dpdk – IoT packet analyzerDpdk – IoT packet analyzer
Dpdk – IoT packet analyzer
 
Mmap failure analysis
Mmap failure analysisMmap failure analysis
Mmap failure analysis
 
Dpdk frame pipeline for ips ids suricata
Dpdk frame pipeline for ips ids suricataDpdk frame pipeline for ips ids suricata
Dpdk frame pipeline for ips ids suricata
 
Poll mode driver integration into dpdk
Poll mode driver integration into dpdkPoll mode driver integration into dpdk
Poll mode driver integration into dpdk
 
DPDK layer for porting IPS-IDS
DPDK layer for porting IPS-IDSDPDK layer for porting IPS-IDS
DPDK layer for porting IPS-IDS
 

Recently uploaded

Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
Ayan Halder
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Crescat
 
Launch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in MinutesLaunch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in Minutes
Roshan Dwivedi
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
Fermin Galan
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
Deuglo Infosystem Pvt Ltd
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Neo4j
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Łukasz Chruściel
 
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
kalichargn70th171
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
Drona Infotech
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
Adele Miller
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
Aftab Hussain
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
Alina Yurenko
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
Shane Coughlan
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
Łukasz Chruściel
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
lorraineandreiamcidl
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
timtebeek1
 
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket ManagementUtilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate
 

Recently uploaded (20)

Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
 
Launch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in MinutesLaunch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in Minutes
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
 
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
 
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket ManagementUtilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
 

Optimizations for ssl tls certificate caching on multicore

  • 1. SSL-TLS Certificate Cachingonmulticore Optimizations for SSL-TLS Certificate Cachingon multicore
  • 2. SSL-TLS Certificate Cachingonmulticore Introduction Technological advancementinmobility sectorhasledtouse of smarterappliancesandservicesforday to day taskand chores.Thishas ledto increase tonetworktrafficinVPN connectionsacrossthe globe in the last decade.Withrise of demandin faster,mobile andlessgeographical constraintworkplace; trafficcontenthas movedfromprivate topublicdomainaccess.Sharingorconnectingtopublicdomain alsoexposesthe system toattackson Webclientandserver infrastructures. Thisbringsin the needtomonitorthe trafficbothinboundandoutboundfromsecure container(canbe eitherClientorServerservices).Thiscanbe done efficientlybyemployingIDSorIPSon the varyinglive traffic(1G to 20G) basedon connections,contentsize,bandwidthetc... Abstract Thiswhite paperexaminesvarious optimizationsoncertificate cachinglogiconmulticore forTCP-SSL Proxyservice tocater to 20G line rate processingforanaverage of 30000 connections/sec. Italso summarizesvariousapproachesanditsbenefitsandpitfallsexploredbefore implementingthe final solutiontoo. Issue In SSL proxywebclientscanrequestforwebpagessupportedminimumof 3 or more certificatesper connection.GeneratingcertificatesforeachproxySSLwill seriouslydeteriorate performance of Interceptiondevice inplace. Ideal wayoutistocache the certificatesrecentlygenerated.Reuse the validcertificate (if fieldsof originalcertificate remainssame, certificateisnotrevoked,TIBhasnot expired).
  • 3. SSL-TLS Certificate Cachingonmulticore Followingreasonscanadverselyaffectcachingperformance 1. Requestforsame webpage fromdifferentconnectionswillbe placedondifferentthreads (processingcores) aspartof concurrency. 2. All threads(processingcores) cangenerate certificateswithsame contenttobe cachedleading to cache space congestion. 3. Same certificate mightbe used informultipleIPof webservers(DNSallow same service to available forsame webservercontent). GeneratingandCache perIPwill be costlyandmemory hogging. 4. Cleanupof cache can be periodicorthresholddriven,there are chanceswithinthe time period requestforCertificate lookupwill yieldastale cachedcertificate. 5. Lookupfor certificate istime bounded,increase intime complexitywillbe TLS-SSLconnection termination. Solution To addressabove issuesfollowingideaswere developedfromgroundup 1. Allowcreationof newcertificatesoneachSSLprocessingcores. 2. Allowpercore fixedqueuetoholdcertificate descriptor(IP,Serial Number,DigestInfoand PointertoCertificate inmemory). 3. Run Certificate managementlogiconsingle thread(representing single processingcore);which scans fornewcertificate descriptorforSSLcores,checksthe contentsare valid,markcached certificate againstrevocationlist,periodicflushthe invalidcertificatefromcache oncongestion or periodictime out. 4. Place certificate lookupinindex basedhash-arraylookupforcertificate.Whichdeliversindex to certificate buffermemoryfromhuge page. 5. Use of vector ISA reducestime incalculatinghashesandindexforlookup.
  • 4. SSL-TLS Certificate Cachingonmulticore Application Future Roadmap  Port the solutionfromRISCmulticore toMIPS,PPCand ARMsolutionsforSSLproxy. Conclusion Utilizingmulticoreandoptimizationtechniquesspecifictothe probleminhand;we were able to accelerate certificate cachingandlookupwithsimpleandpragmaticoptimizations. 0 5000 10000 15000 20000 25000 30000 35000 1024 2048 4096 8000 3400 1200 30500 12000 7500 CONNECTIONPERSEC KEY SIZE Performance Comparision Generated Cached