SlideShare uma empresa Scribd logo
1 de 21
Baixar para ler offline
Unleashing End-To-End TLS Security
Leveraging NGINX with Intel®
QuickAssist Technology and
OpenSSL-1.1.0
1. Market Trends
2. Overview of Intel® QuickAssist Technology
3. NGINX* -1.10 HTTPS Serving Results
4. OpenSSL* -1.1.0 Asynchronous Feature?
5. Summary
Agenda!
Copyright © 2016 Intel Corporation. All rights reserved. Intel, the Intel logo and Xeon are trademarks of Intel Corporation in the United States and/or other countries.
*Other names and brands may be claimed as the property of others.
3
Encryption: Market Trends
•  Largest sources of streaming applications
(Netflix* & YouTube*) committed to using Https
•  Video traffic continues to grow2
•  Mobile Traffic grew 74% in 20152
More Encrypted Traffic
70% of Internet Traffic Latin &
North America will be Encrypted
in 20161
1 Source: 2016 Global Internet Phenomena, Latin & North America, Sandvine*
2 Source: 2016 Cisco* Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2015–2020 White Paper
•  Privacy
•  Video
•  Mobile
•  Cloud Computing
Copyright © 2016 Intel Corporation. All rights reserved. Intel, the Intel logo and Xeon are trademarks of Intel Corporation in the United States and/or other countries.
*Other names and brands may be claimed as the property of others.
4
Enabling SDI for NFV & Hyperconvergence with
Intel® QuickAssist Technology
Compute
Network
Storage
App 1
App 2
App 3
QuickAssist
Static
Purpose-built, Proprietary
Resource Pool
Orchestration SW
App 1 App 2App 3
Dynamic Software Defined
Infrastructure
Compute
Network Storage
Copyright © 2016 Intel Corporation. All rights reserved. Intel, the Intel logo and Xeon are trademarks of Intel Corporation in the United States and/or other countries.
*Other names and brands may be claimed as the property of others.
1. Market Trends
2. Overview of Intel® QuickAssist Technology
3. NGINX* -1.10 HTTPS Serving Results
4. OpenSSL* -1.1.0 Asynchronous Feature?
5. Summary
Agenda!
Copyright © 2016 Intel Corporation. All rights reserved. Intel, the Intel logo and Xeon are trademarks of Intel Corporation in the United States and/or other countries.
*Other names and brands may be claimed as the property of others.
Technology
What it is, How it’s deployed
•  Security (symmetric
encryption and
authentication) for data in
flight and at rest
Bulk
Cryptography
•  Secure Key Establishment
(asymmetric encryption,
digital signatures, key
exchange)
Public Key
Cryptography
•  Lossless data compression
for data in flight and at rest
Compression
Intel® QuickAssist Technology integrates hardware acceleration of compute intensive workloads
(specifically, cryptography & compression) on Intel® Architecture Platform Technology
Chipset
Connects to CPU
via on-board PCI
Express* lanes
PCI
Express*
Plugin
Card
Connects to CPU
via off-board PCI
Express* lanes
(slot)
SoC
Connects to CPU
via on-chip
interconnect
Copyright © 2016 Intel Corporation. All rights reserved. Intel, the Intel logo and Xeon are trademarks of Intel Corporation in the United States and/or other countries.
*Other names and brands may be claimed as the property of others.
Intel® QuickAssist Technology: Crypto
Usage Model
•  Network security (IPsec, SSL/TLS), hashing for data-
deduplication, encrypted storage
Symmetric (Bulk) Cryptography
•  Ciphers (AES, 3DES/DES, RC4, KASUMI*, Snow 3G)
•  Wireless ciphers: KASUMI, Snow 3G
•  Message digest/hash (MD5, SHA1, SHA2)
•  Authentication (HMAC, AES in modes XCBC-MAC, CBC-MAC,
CMAC, GMAC)
•  Algorithm chaining (one cipher and one hash/authentication in
a single operation)
•  Authenticated encryption (AES-GCM, AES-CCM)
Asymmetric (Public Key) Cryptography
•  RSA key generation, encryption/decryption and digital
signature generation/verification
•  Elliptic Curve Cryptography: ECDSA, ECDHE
•  Modular exponentiation for Diffie-Hellman (DH)
•  DSA parameter generation and digital signature generation/
verification
Intel® DH8955 PCH
(Gen 1)
Network Security Protocols
TLS @ 4k records 50 Gbps
Inline IPSec @ 512B
Public Key Encryption
RSA Decrypt 2K 40k Ops/sec
TLS Handshakes with PFS
ECDHE + RSA2K:
17.6K Ops/sec
TLS Handshakes with PFS
ECDHE + ECDSA:
20K Ops/sec
Wireless Ciphers
ZUC/Snow 3G/KASUMI* F82 20 Gbps
Snow 3G 20 Gbps
Cipher or Hash Only
AES XTS 50Gbs
SHA1, SHA256, SHA3, MD5 50Gbs
1.  Bulk Crypto uses AES-CBC-HMAC SHA1/256/SHA3 or AES GCM
2.  KASUMI-F8 (encryption) at 320B packets, 15 Gbs for 40B packets
3.  PFS = Perfect Forward Secrecy
Results have been estimated based on internal Intel analysis and are provided for
informational purposes only. Any difference in system hardware or software design or
configuration may affect actual performance.
Copyright © 2016 Intel Corporation. All rights reserved. Intel, the Intel logo and Xeon are trademarks of Intel Corporation in the United States and/or other countries.
*Other names and brands may be claimed as the property of others.
8
Intel® QuickAssist Technology: Data Compression
Usage Model
•  Big data Acceleration
•  WAN acceleration
•  Http compression
•  File System
•  Databases
Compression and Decompression Using the Following Algorithms
•  DEFLATE: LZ77 compression followed by Huffman coding, with
a gzip or zlib header
Other Features
•  Support for multiple history sizes with deflate
•  Support for stateful (de)compression
•  Supports Batch and Pack (seekable compression)
•  Supports Chaining of Compression & Crypto for data integrity
(SHAx, MD5) and data encryption with AES XTS, CBC
•  Supports “Compress & Verify”
Performance Intel® DH8955
PCH (Gen 1)
Compression 24 Gbs1
Decompression 24 Gbs1
Compression + Decompression 24 Gbs1
1.  Dynamic Deflate Level 1 using 64KB buffer size
2.  Measured using Calgary and Silesia corpi
Results have been estimated based on internal Intel analysis and are provided for
informational purposes only. Any difference in system hardware or software design or
configuration may affect actual performance.
#NetworkZeroToSecureCopyright © 2016 Intel Corporation. All rights reserved. Intel, the Intel logo and Xeon are trademarks of Intel Corporation in the United States and/or other countries.
*Other names and brands may be claimed as the property of others.
1. Market Trends
2. Overview of Intel® QuickAssist Technology
3. NGINX* -1.10 HTTPS Serving Results
4. OpenSSL* -1.1.0 Asynchronous Feature?
5. Summary
Agenda!
Copyright © 2016 Intel Corporation. All rights reserved. Intel, the Intel logo and Xeon are trademarks of Intel Corporation in the United States and/or other countries.
*Other names and brands may be claimed as the property of others.
Web Server Benchmark – Logical view
10
Client(s)	
HTTPS	
Server	
H1ps	request,	Session	
Establishment		
Encrypted	Web	Page	
Close	ConnecAon	
NGINX*	+	OpenSSL-1.1.0*	+	Intel®	
QuickAssist	Technology	Engine	on	
Standard	Linux*	
HTTPS	Requests	
Encrypted	ConnecKons	
Bulk Throughput Test
Application Data 0 Byte File
Certificates RSA-2K
ECDHE-RSA-2K (P256)
ECDHE-ECDSA (P256)
Protocol TLS v1.2
Cipher Suite AES_128_CBC_SHA
Copyright © 2016 Intel Corporation. All rights reserved. Intel, the Intel logo and Xeon are trademarks of Intel Corporation in the United States and/or other countries.
*Other names and brands may be claimed as the property of others.
Web Server Key Exchange Details
Source as of August 2016: Intel internal measurements with one E5-2699 v3 (18C, 2.3GHz, 145W), HSW-C1, HT & Turbo Enabled, NUMA & COD mode, Linux kernel: 3.11.10, gcc-4.8.3-7, BIOS GRNDCRB1.86B.
0032.R02.1405090848, OpenSSL-1.1.0. Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark* and MobileMark*, are
measured using specific computer systems, components, software, operations and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you
in fully evaluating your contemplated purchases, including the performance of that product when combined with other products. Any difference in system hardware or software design or configuration may affect actual performance.
Results have been estimated based on internal Intel analysis and are provided for informational purposes only. Any difference in system hardware or software design or configuration may affect actual performance. For more information
go to http://www.intel.com/performance
1
1
Intel® QuickAssist Technology + OpenSSL*-1.1.0
Async gain over software!
RSA-2K ~5.6x!
ECDHE-RSA-2K ~3.7x!
ECDHE-ECDSA ~1.25x*!
* further improvements in development.
1. Market Trends
2. Overview of Intel® QuickAssist Technology
3. NGINX* -1.10 HTTPS Serving Results
4. OpenSSL* -1.1.0 Asynchronous Feature?
5. Summary
Agenda!
Copyright © 2016 Intel Corporation. All rights reserved. Intel, the Intel logo and Xeon are trademarks of Intel Corporation in the United States and/or other countries.
*Other names and brands may be claimed as the property of others.
Asynchronous OpenSSL*
OpenSSL, an open-source implementation of the TLS protocols, is estimated to encrypt 66% of all
active websites1
Asynchronous OpenSSL enables applications to get increased parallelism and throughput at lower
costs
1 Source: Netcraft* April 2014 Web Server Survey
Post
Descriptor(s)
Thread
Completion
Notification(s)
Synchronous Mode, Multiple Threads/Processes
Context Swap
Post
Descriptor(s)
Thread
Completion
Notification(s)
Asynchronous Mode, Single Thread/Process
Copyright © 2016 Intel Corporation. All rights reserved. Intel, the Intel logo and Xeon are trademarks of Intel Corporation in the United States and/or other countries.
*Other names and brands may be claimed as the property of others.
New Features in 1.1.0 (associated with async)
JOB Infrastructure Operations https://www.openssl.org/docs/manmaster/crypto/ASYNC_start_job.html
•  Adds the ability for the engine to pause an existing operation flow (such as an SSL struct/
connection) and return to the calling application an error that indicates the JOB has been
PAUSED. The application can then activate the JOB again at any time through the JOB
infrastructure. (these are very light weight contexts).
Event Notifications: https://www.openssl.org/docs/manmaster/ssl/SSL_get_all_async_fds.html
•  These API’s access the event file descriptors associated with a SSL connection. These allow
the application to query the active FD’s and subsequently use them in a call to select/epoll/
poll.
SYNC/ASYNC Intel® QuickAssist Technology support:
https://www.openssl.org/docs/manmaster/ssl/SSL_CTX_set_mode.html
•  The API simply allows enabling a connection for async support.
Pipelining: https://www.openssl.org/docs/manmaster/ssl/SSL_CTX_set_split_send_fragment.html
•  Allows multiple SSL records (or encryption JOBs) to be submitted to the engine as a single
request/API invocation.
Copyright © 2016 Intel Corporation. All rights reserved. Intel, the Intel logo and Xeon are trademarks of Intel Corporation in the United States and/or other countries.
*Other names and brands may be claimed as the property of others.
Asynchronous Advantages
Source as of August 2016: Intel internal measurements with one E5-2699 v3 (18C, 2.3GHz, 145W), HSW-C1, HT & Turbo Enabled, NUMA & COD mode, Linux kernel: 3.11.10, gcc-4.8.3-7, BIOS GRNDCRB1.86B.
0032.R02.1405090848, OpenSSL-1.1.0. Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark* and MobileMark*, are
measured using specific computer systems, components, software, operations and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you
in fully evaluating your contemplated purchases, including the performance of that product when combined with other products. Any difference in system hardware or software design or configuration may affect actual performance.
Results have been estimated based on internal Intel analysis and are provided for informational purposes only. Any difference in system hardware or software design or configuration may affect actual performance. For more information
go to http://www.intel.com/performance
Asynchronous support in
OpenSSL*-1.1.0, combined
with Intel® QuickAssist
Technology and
NGINX*-1.10 results in a
5.6 gain over software
and 3.9 gain over synch
invocation for the same
configuration.
Note: Measured using a single worker
process per logical core. Configurations
were kept consistent for each mode of
operation; software, sync and async
OpenSSL*-1.1.0 added JOB/Fibre support
Encapsulates a running piece of work such as an
SSL connection and allows it to be:
Paused, woken up and signaling status
JOB’s will be used to manage SSL connections
Allowing a connection to pause at any point during
processing.
Jump directly back to that execution point
JOB’s will have associated FD’s that an application
can epoll/poll/select on
JOB’s are based on the POSIX primitives:
makecontext, getcontext, setjmp, longjmp
Note: Start and Destroy context switches will be amortized
across multiple calls.
1
6
EVP	API
ASYNC_start_job
QAT	EngineASYNC	JOB
RSA_sign
QAT	Driver
cpaCyRsaDecrypt	(non-blocking)
ASYNC_pause_job
ASYNC_FIBRE_swapcontext
ASYNC_FIBRE_swapcontext
RSA_sign
ASYNC_start_job
ASYNC_FIBRE_swapcontext
rsa_decrypt
delivery	result
return	RSA	sign	result
Copyright © 2016 Intel Corporation. All rights reserved. Intel, the Intel logo and Xeon are trademarks of Intel Corporation in the United States and/or other countries.
*Other names and brands may be claimed as the property of others.
QuickAssist Technology
Features
Intel QuickAssist Technology Engine released: https://github.com/01org/QAT_Engine
Asymmetric PKE Offload
•  RSA Support with PKCS1 Padding for Key Sizes 1024/2048/4096.
•  DH Support for Key Sizes 768/1024/1536/2048/3072/4096.
•  DSA Support for Key Sizes 160/1024, 224/2048, 256/2048, 256/3072.
•  ECDH Support for the following curves:
•  NIST Prime Curves: P-192/P-224/P-256/P-384/P-521.
•  NIST Binary Curves: B-163/B-233/B-283/B-409/B-571.
•  NIST Koblitz Curves: K-163/K-233/K-283/K409/K-571.
•  ECDSA Support for the following curves:
•  NIST Prime Curves: P-192/P-224/P-256/P-384/P-521.
•  NIST Binary Curves: B-163/B-233/B-283/B-409/B-571.
•  NIST Koblitz Curves: K-163/K-233/K-283/K409/K-571.
Symmetric Chained Cipher Offload
•  AES128-CBC-HMAC-SHA1/AES256-CBC-HMAC-SHA1.
•  AES128-CBC-HMAC-SHA256/AES256-CBC-HMAC-SHA256.
TLS/SSL specific algorithms
•  Pseudo Random Function (PRF) offload.
•  For TLSv1.2, v1.1 and SSLv3.0
Future Work
•  Pipeline support
Copyright © 2016 Intel Corporation. All rights reserved. Intel, the Intel logo and Xeon are trademarks of Intel Corporation in the United States and/or other countries.
*Other names and brands may be claimed as the property of others.
Modifications to NGINX* to
support Event architecture in
OpenSSL*-1.1.0
NGINX configuration:
•  ‘ssl_asynch on;’ added to allow enabling per server block. This will enable all SSL connections for that server to run
asynchronously if supported.
ngx_connection_t:
•  Each connection is aware of FD’s associated with an SSL_CTX (typically one).
NGINX event notifications:
•  JOB FD’s will notify NGINX of data availability on an asynchronous JOB from OpenSSL. As such they get added to
the top level epoll FD instance.
SSL connection events:
•  Are treated as another event source, in a similar manner to socket read/write. To re-enable the JOB (source of the
event) NGINX simply calls the associated SSL_* API (SSL_read, SSL_write, SSL_do_handshake etc.)
Copyright © 2016 Intel Corporation. All rights reserved. Intel, the Intel logo and Xeon are trademarks of Intel Corporation in the United States and/or other countries.
*Other names and brands may be claimed as the property of others.
1. Market Trends
2. Overview of Intel® QuickAssist Technology
3. NGINX* -1.10 HTTPS Serving Results
4. OpenSSL* -1.1.0 Asynchronous Feature?
5. Summary
Agenda!
Copyright © 2016 Intel Corporation. All rights reserved. Intel, the Intel logo and Xeon are trademarks of Intel Corporation in the United States and/or other countries.
*Other names and brands may be claimed as the property of others.
Summary
•  Intel® QuickAssist Technology + NGINX*-1.10 + OpenSSL*-1.1.0 provide vast performance improvements
for HTTPs transactions
•  Engage with Intel Today to Optimize Crypto & Compression in your Workloads
For further resources/information:
•  For more information on Intel® QuickAssist Technology & Intel® QuickAssist Software Solutions can be found here:
•  Software Package available at 01.org: Intel QuickAssist Technology | 01.org
•  Intel® QuickAssist Technology engine for OpenSSL-1.1.0: https://github.com/01org/QAT_Engine
•  For more details on Intel® QuickAssist Technology visit: http://www.intel.com/quickassist
•  Intel Network Builders: https://networkbuilders.intel.com/ecosystem
•  Intel QuickAssist Chipset: http://ark.intel.com/products/80372/Intel-DH8955-PCH
•  Intel QuickAssist Adapter: http://ark.intel.com/products/79483/Intel-QuickAssist-Adapter-8950
•  OpenSSL 1.1.0 to Support Intel® QuickAssist and other optimizations
•  http://www.servethehome.com/openssl-1-1-0-quickassist-optimizations/
•  OpenSSL Webinar: https://www.brighttalk.com/webcast/12229/172667
2
0
Copyright © 2016 Intel Corporation. All rights reserved. Intel, the Intel logo and Xeon are trademarks of Intel Corporation in the United States and/or other countries.
*Other names and brands may be claimed as the property of others.
Copyright © 2016 Intel Corporation. All rights reserved. Intel, the Intel logo and Xeon are trademarks of Intel Corporation in the United States and/or other countries.
*Other names and brands may be claimed as the property of others.
Questions?!

Mais conteúdo relacionado

Mais procurados

Revisit DCA, PCIe TPH and DDIO
Revisit DCA, PCIe TPH and DDIORevisit DCA, PCIe TPH and DDIO
Revisit DCA, PCIe TPH and DDIOHisaki Ohara
 
DPDK Summit 2015 - Intro - Tim O'Driscoll
DPDK Summit 2015 - Intro - Tim O'DriscollDPDK Summit 2015 - Intro - Tim O'Driscoll
DPDK Summit 2015 - Intro - Tim O'DriscollJim St. Leger
 
DPDK Summit 2015 - Intel - Keith Wiles
DPDK Summit 2015 - Intel - Keith WilesDPDK Summit 2015 - Intel - Keith Wiles
DPDK Summit 2015 - Intel - Keith WilesJim St. Leger
 
Intel NFVi Enabling Kit Demo/Lab
Intel NFVi Enabling Kit Demo/LabIntel NFVi Enabling Kit Demo/Lab
Intel NFVi Enabling Kit Demo/LabMichelle Holley
 
DPDK Summit - 08 Sept 2014 - NTT - High Performance vSwitch
DPDK Summit - 08 Sept 2014 - NTT - High Performance vSwitchDPDK Summit - 08 Sept 2014 - NTT - High Performance vSwitch
DPDK Summit - 08 Sept 2014 - NTT - High Performance vSwitchJim St. Leger
 
Quieting noisy neighbor with Intel® Resource Director Technology
Quieting noisy neighbor with Intel® Resource Director TechnologyQuieting noisy neighbor with Intel® Resource Director Technology
Quieting noisy neighbor with Intel® Resource Director TechnologyMichelle Holley
 
Intel® Ethernet Update
Intel® Ethernet Update Intel® Ethernet Update
Intel® Ethernet Update Michelle Holley
 
Netsft2017 day in_life_of_nfv
Netsft2017 day in_life_of_nfvNetsft2017 day in_life_of_nfv
Netsft2017 day in_life_of_nfvIntel
 
Cache Consistency – Requirements and its packet processing Performance implic...
Cache Consistency – Requirements and its packet processing Performance implic...Cache Consistency – Requirements and its packet processing Performance implic...
Cache Consistency – Requirements and its packet processing Performance implic...Michelle Holley
 
DPDK Summit 2015 - NTT - Yoshihiro Nakajima
DPDK Summit 2015 - NTT - Yoshihiro NakajimaDPDK Summit 2015 - NTT - Yoshihiro Nakajima
DPDK Summit 2015 - NTT - Yoshihiro NakajimaJim St. Leger
 
Install FD.IO VPP On Intel(r) Architecture & Test with Trex*
Install FD.IO VPP On Intel(r) Architecture & Test with Trex*Install FD.IO VPP On Intel(r) Architecture & Test with Trex*
Install FD.IO VPP On Intel(r) Architecture & Test with Trex*Michelle Holley
 
Session 8,9 PCI Express
Session 8,9 PCI ExpressSession 8,9 PCI Express
Session 8,9 PCI ExpressSubhash Iyer
 
Using VPP and SRIO-V with Clear Containers
Using VPP and SRIO-V with Clear ContainersUsing VPP and SRIO-V with Clear Containers
Using VPP and SRIO-V with Clear ContainersMichelle Holley
 
The Role of a Network Software Developer in Network Transformation
The Role of a Network Software Developer in Network TransformationThe Role of a Network Software Developer in Network Transformation
The Role of a Network Software Developer in Network TransformationMichelle Holley
 
Devconf2017 - Can VMs networking benefit from DPDK
Devconf2017 - Can VMs networking benefit from DPDKDevconf2017 - Can VMs networking benefit from DPDK
Devconf2017 - Can VMs networking benefit from DPDKMaxime Coquelin
 
Chapter 20 : access control lists
Chapter 20 : access control listsChapter 20 : access control lists
Chapter 20 : access control liststeknetir
 
Chapter 21 : DHCP
Chapter 21 : DHCPChapter 21 : DHCP
Chapter 21 : DHCPteknetir
 
OVS and DPDK - T.F. Herbert, K. Traynor, M. Gray
OVS and DPDK - T.F. Herbert, K. Traynor, M. GrayOVS and DPDK - T.F. Herbert, K. Traynor, M. Gray
OVS and DPDK - T.F. Herbert, K. Traynor, M. Grayharryvanhaaren
 
PCIe Gen 3.0 Presentation @ 4th FPGA Camp
PCIe Gen 3.0 Presentation @ 4th FPGA CampPCIe Gen 3.0 Presentation @ 4th FPGA Camp
PCIe Gen 3.0 Presentation @ 4th FPGA CampFPGA Central
 

Mais procurados (20)

Revisit DCA, PCIe TPH and DDIO
Revisit DCA, PCIe TPH and DDIORevisit DCA, PCIe TPH and DDIO
Revisit DCA, PCIe TPH and DDIO
 
DPDK Summit 2015 - Intro - Tim O'Driscoll
DPDK Summit 2015 - Intro - Tim O'DriscollDPDK Summit 2015 - Intro - Tim O'Driscoll
DPDK Summit 2015 - Intro - Tim O'Driscoll
 
DPDK Summit 2015 - Intel - Keith Wiles
DPDK Summit 2015 - Intel - Keith WilesDPDK Summit 2015 - Intel - Keith Wiles
DPDK Summit 2015 - Intel - Keith Wiles
 
Intel NFVi Enabling Kit Demo/Lab
Intel NFVi Enabling Kit Demo/LabIntel NFVi Enabling Kit Demo/Lab
Intel NFVi Enabling Kit Demo/Lab
 
Intel dpdk Tutorial
Intel dpdk TutorialIntel dpdk Tutorial
Intel dpdk Tutorial
 
DPDK Summit - 08 Sept 2014 - NTT - High Performance vSwitch
DPDK Summit - 08 Sept 2014 - NTT - High Performance vSwitchDPDK Summit - 08 Sept 2014 - NTT - High Performance vSwitch
DPDK Summit - 08 Sept 2014 - NTT - High Performance vSwitch
 
Quieting noisy neighbor with Intel® Resource Director Technology
Quieting noisy neighbor with Intel® Resource Director TechnologyQuieting noisy neighbor with Intel® Resource Director Technology
Quieting noisy neighbor with Intel® Resource Director Technology
 
Intel® Ethernet Update
Intel® Ethernet Update Intel® Ethernet Update
Intel® Ethernet Update
 
Netsft2017 day in_life_of_nfv
Netsft2017 day in_life_of_nfvNetsft2017 day in_life_of_nfv
Netsft2017 day in_life_of_nfv
 
Cache Consistency – Requirements and its packet processing Performance implic...
Cache Consistency – Requirements and its packet processing Performance implic...Cache Consistency – Requirements and its packet processing Performance implic...
Cache Consistency – Requirements and its packet processing Performance implic...
 
DPDK Summit 2015 - NTT - Yoshihiro Nakajima
DPDK Summit 2015 - NTT - Yoshihiro NakajimaDPDK Summit 2015 - NTT - Yoshihiro Nakajima
DPDK Summit 2015 - NTT - Yoshihiro Nakajima
 
Install FD.IO VPP On Intel(r) Architecture & Test with Trex*
Install FD.IO VPP On Intel(r) Architecture & Test with Trex*Install FD.IO VPP On Intel(r) Architecture & Test with Trex*
Install FD.IO VPP On Intel(r) Architecture & Test with Trex*
 
Session 8,9 PCI Express
Session 8,9 PCI ExpressSession 8,9 PCI Express
Session 8,9 PCI Express
 
Using VPP and SRIO-V with Clear Containers
Using VPP and SRIO-V with Clear ContainersUsing VPP and SRIO-V with Clear Containers
Using VPP and SRIO-V with Clear Containers
 
The Role of a Network Software Developer in Network Transformation
The Role of a Network Software Developer in Network TransformationThe Role of a Network Software Developer in Network Transformation
The Role of a Network Software Developer in Network Transformation
 
Devconf2017 - Can VMs networking benefit from DPDK
Devconf2017 - Can VMs networking benefit from DPDKDevconf2017 - Can VMs networking benefit from DPDK
Devconf2017 - Can VMs networking benefit from DPDK
 
Chapter 20 : access control lists
Chapter 20 : access control listsChapter 20 : access control lists
Chapter 20 : access control lists
 
Chapter 21 : DHCP
Chapter 21 : DHCPChapter 21 : DHCP
Chapter 21 : DHCP
 
OVS and DPDK - T.F. Herbert, K. Traynor, M. Gray
OVS and DPDK - T.F. Herbert, K. Traynor, M. GrayOVS and DPDK - T.F. Herbert, K. Traynor, M. Gray
OVS and DPDK - T.F. Herbert, K. Traynor, M. Gray
 
PCIe Gen 3.0 Presentation @ 4th FPGA Camp
PCIe Gen 3.0 Presentation @ 4th FPGA CampPCIe Gen 3.0 Presentation @ 4th FPGA Camp
PCIe Gen 3.0 Presentation @ 4th FPGA Camp
 

Destaque

Introduction to OpenDaylight & Application Development
Introduction to OpenDaylight & Application DevelopmentIntroduction to OpenDaylight & Application Development
Introduction to OpenDaylight & Application DevelopmentMichelle Holley
 
Intel(r) Quick Assist Technology Overview
Intel(r) Quick Assist Technology OverviewIntel(r) Quick Assist Technology Overview
Intel(r) Quick Assist Technology OverviewMichelle Holley
 
TLS Certificates on the Web – The Good, The Bad and The Ugly
TLS Certificates on the Web – The Good, The Bad and The Ugly TLS Certificates on the Web – The Good, The Bad and The Ugly
TLS Certificates on the Web – The Good, The Bad and The Ugly CASCouncil
 
Drupal 8 and NGINX
Drupal 8 and NGINX Drupal 8 and NGINX
Drupal 8 and NGINX NGINX, Inc.
 
How to enhance hyperconvergence with infrastructure management
How to enhance hyperconvergence with infrastructure managementHow to enhance hyperconvergence with infrastructure management
How to enhance hyperconvergence with infrastructure managementrdelima
 
Interop: Presentation
Interop:  PresentationInterop:  Presentation
Interop: PresentationBytemobile
 
Case Study:Intel Strategy On 1990s
Case Study:Intel Strategy On 1990sCase Study:Intel Strategy On 1990s
Case Study:Intel Strategy On 1990sDjadja Sardjana
 
Hyperconvergence 101: A Crash Course in Redefining Your Infrastructure
Hyperconvergence 101: A Crash Course in Redefining Your InfrastructureHyperconvergence 101: A Crash Course in Redefining Your Infrastructure
Hyperconvergence 101: A Crash Course in Redefining Your InfrastructureePlus
 
How to encrypt everything that moves and keep it usable
How to encrypt everything that moves and keep it usableHow to encrypt everything that moves and keep it usable
How to encrypt everything that moves and keep it usableDenis Gundarev
 
Porter's 5 force model(oil & gas sector)
Porter's 5 force model(oil & gas sector)Porter's 5 force model(oil & gas sector)
Porter's 5 force model(oil & gas sector)Saurabh Agarwal
 
SDN/NFV Building Block Introduction
SDN/NFV Building Block IntroductionSDN/NFV Building Block Introduction
SDN/NFV Building Block IntroductionMichelle Holley
 
Network: Synchronization: IEEE1588's Future in Computing and the Data Center
Network: Synchronization: IEEE1588's Future in Computing and the Data CenterNetwork: Synchronization: IEEE1588's Future in Computing and the Data Center
Network: Synchronization: IEEE1588's Future in Computing and the Data CenterMichelle Holley
 
OpenSSL + Intel (r) Quick Assist Technology Engine Setup Instructions
OpenSSL + Intel (r) Quick Assist Technology Engine Setup InstructionsOpenSSL + Intel (r) Quick Assist Technology Engine Setup Instructions
OpenSSL + Intel (r) Quick Assist Technology Engine Setup InstructionsMichelle Holley
 
DPDK in Containers Hands-on Lab
DPDK in Containers Hands-on LabDPDK in Containers Hands-on Lab
DPDK in Containers Hands-on LabMichelle Holley
 
Porter's Five Forces
Porter's Five ForcesPorter's Five Forces
Porter's Five ForcesMayur Khatri
 

Destaque (20)

Introduction to OpenDaylight & Application Development
Introduction to OpenDaylight & Application DevelopmentIntroduction to OpenDaylight & Application Development
Introduction to OpenDaylight & Application Development
 
Intel(r) Quick Assist Technology Overview
Intel(r) Quick Assist Technology OverviewIntel(r) Quick Assist Technology Overview
Intel(r) Quick Assist Technology Overview
 
TLS Certificates on the Web – The Good, The Bad and The Ugly
TLS Certificates on the Web – The Good, The Bad and The Ugly TLS Certificates on the Web – The Good, The Bad and The Ugly
TLS Certificates on the Web – The Good, The Bad and The Ugly
 
Drupal 8 and NGINX
Drupal 8 and NGINX Drupal 8 and NGINX
Drupal 8 and NGINX
 
How to enhance hyperconvergence with infrastructure management
How to enhance hyperconvergence with infrastructure managementHow to enhance hyperconvergence with infrastructure management
How to enhance hyperconvergence with infrastructure management
 
Interop: Presentation
Interop:  PresentationInterop:  Presentation
Interop: Presentation
 
Case Study:Intel Strategy On 1990s
Case Study:Intel Strategy On 1990sCase Study:Intel Strategy On 1990s
Case Study:Intel Strategy On 1990s
 
Hyperconvergence 101: A Crash Course in Redefining Your Infrastructure
Hyperconvergence 101: A Crash Course in Redefining Your InfrastructureHyperconvergence 101: A Crash Course in Redefining Your Infrastructure
Hyperconvergence 101: A Crash Course in Redefining Your Infrastructure
 
How to encrypt everything that moves and keep it usable
How to encrypt everything that moves and keep it usableHow to encrypt everything that moves and keep it usable
How to encrypt everything that moves and keep it usable
 
F5 TLS & SSL Practices
F5 TLS & SSL PracticesF5 TLS & SSL Practices
F5 TLS & SSL Practices
 
Porter's 5 force model(oil & gas sector)
Porter's 5 force model(oil & gas sector)Porter's 5 force model(oil & gas sector)
Porter's 5 force model(oil & gas sector)
 
SDN/NFV Building Block Introduction
SDN/NFV Building Block IntroductionSDN/NFV Building Block Introduction
SDN/NFV Building Block Introduction
 
Network: Synchronization: IEEE1588's Future in Computing and the Data Center
Network: Synchronization: IEEE1588's Future in Computing and the Data CenterNetwork: Synchronization: IEEE1588's Future in Computing and the Data Center
Network: Synchronization: IEEE1588's Future in Computing and the Data Center
 
Michael Porter's Five Forces Model
Michael Porter's Five Forces ModelMichael Porter's Five Forces Model
Michael Porter's Five Forces Model
 
Intel Core i7 Processors
Intel Core i7 ProcessorsIntel Core i7 Processors
Intel Core i7 Processors
 
OpenSSL + Intel (r) Quick Assist Technology Engine Setup Instructions
OpenSSL + Intel (r) Quick Assist Technology Engine Setup InstructionsOpenSSL + Intel (r) Quick Assist Technology Engine Setup Instructions
OpenSSL + Intel (r) Quick Assist Technology Engine Setup Instructions
 
DPDK in Containers Hands-on Lab
DPDK in Containers Hands-on LabDPDK in Containers Hands-on Lab
DPDK in Containers Hands-on Lab
 
Porter’s five forces
Porter’s five forcesPorter’s five forces
Porter’s five forces
 
Porter's Five Forces
Porter's Five ForcesPorter's Five Forces
Porter's Five Forces
 
Porter's 5 Force Model
Porter's 5 Force ModelPorter's 5 Force Model
Porter's 5 Force Model
 

Semelhante a Unleashing End-to_end TLS Security Leveraging NGINX with Intel(r) QuickAssist Technology and Open SL

Serie dei nuovi processori Xeon Scalabili - Yashi Italia
Serie dei nuovi processori Xeon Scalabili - Yashi ItaliaSerie dei nuovi processori Xeon Scalabili - Yashi Italia
Serie dei nuovi processori Xeon Scalabili - Yashi ItaliaYashi Italia
 
QATCodec: past, present and future
QATCodec: past, present and futureQATCodec: past, present and future
QATCodec: past, present and futureboxu42
 
Embedded Chief River Design-In Presentation_30442998.pdf
Embedded Chief River Design-In Presentation_30442998.pdfEmbedded Chief River Design-In Presentation_30442998.pdf
Embedded Chief River Design-In Presentation_30442998.pdfOemTest
 
Intel’s Big Data and Hadoop Security Initiatives - StampedeCon 2014
Intel’s Big Data and Hadoop Security Initiatives - StampedeCon 2014Intel’s Big Data and Hadoop Security Initiatives - StampedeCon 2014
Intel’s Big Data and Hadoop Security Initiatives - StampedeCon 2014StampedeCon
 
Edge Computing and 5G - SDN/NFV London meetup
Edge Computing and 5G - SDN/NFV London meetupEdge Computing and 5G - SDN/NFV London meetup
Edge Computing and 5G - SDN/NFV London meetupHaidee McMahon
 
z/OS V2R3 Communications Server Content Preview
z/OS V2R3 Communications Server Content Previewz/OS V2R3 Communications Server Content Preview
z/OS V2R3 Communications Server Content PreviewzOSCommserver
 
NFF-GO (YANFF) - Yet Another Network Function Framework
NFF-GO (YANFF) - Yet Another Network Function FrameworkNFF-GO (YANFF) - Yet Another Network Function Framework
NFF-GO (YANFF) - Yet Another Network Function FrameworkMichelle Holley
 
DPDK IPSec performance benchmark ~ Georgii Tkachuk
DPDK IPSec performance benchmark ~ Georgii TkachukDPDK IPSec performance benchmark ~ Georgii Tkachuk
DPDK IPSec performance benchmark ~ Georgii TkachukIntel
 
QNAP for IoT
QNAP for IoTQNAP for IoT
QNAP for IoTqnapivan
 
Cisco Live! :: Introduction to IOS XR for Enterprises and Service Providers
Cisco Live! :: Introduction to IOS XR for Enterprises and Service ProvidersCisco Live! :: Introduction to IOS XR for Enterprises and Service Providers
Cisco Live! :: Introduction to IOS XR for Enterprises and Service ProvidersBruno Teixeira
 
DAOS - Scale-Out Software-Defined Storage for HPC/Big Data/AI Convergence
DAOS - Scale-Out Software-Defined Storage for HPC/Big Data/AI ConvergenceDAOS - Scale-Out Software-Defined Storage for HPC/Big Data/AI Convergence
DAOS - Scale-Out Software-Defined Storage for HPC/Big Data/AI Convergenceinside-BigData.com
 
Intel® QuickAssist Technology Introduction, Applications, and Lab, Including ...
Intel® QuickAssist Technology Introduction, Applications, and Lab, Including ...Intel® QuickAssist Technology Introduction, Applications, and Lab, Including ...
Intel® QuickAssist Technology Introduction, Applications, and Lab, Including ...Michelle Holley
 
Intels presentation at blue line industrial computer seminar
Intels presentation at blue line industrial computer seminarIntels presentation at blue line industrial computer seminar
Intels presentation at blue line industrial computer seminarBlue Line
 
Intel: How to Use Alluxio to Accelerate BigData Analytics on the Cloud and Ne...
Intel: How to Use Alluxio to Accelerate BigData Analytics on the Cloud and Ne...Intel: How to Use Alluxio to Accelerate BigData Analytics on the Cloud and Ne...
Intel: How to Use Alluxio to Accelerate BigData Analytics on the Cloud and Ne...Alluxio, Inc.
 
Introduction ciot workshop premeetup
Introduction ciot workshop premeetupIntroduction ciot workshop premeetup
Introduction ciot workshop premeetupBeMyApp
 
Lynn Comp - Big Data & Cloud Summit 2013
Lynn Comp - Big Data & Cloud Summit 2013Lynn Comp - Big Data & Cloud Summit 2013
Lynn Comp - Big Data & Cloud Summit 2013IntelAPAC
 
Best Practice of Compression/Decompression Codes in Apache Spark with Sophia...
 Best Practice of Compression/Decompression Codes in Apache Spark with Sophia... Best Practice of Compression/Decompression Codes in Apache Spark with Sophia...
Best Practice of Compression/Decompression Codes in Apache Spark with Sophia...Databricks
 
Accelerate Ceph performance via SPDK related techniques
Accelerate Ceph performance via SPDK related techniques Accelerate Ceph performance via SPDK related techniques
Accelerate Ceph performance via SPDK related techniques Ceph Community
 

Semelhante a Unleashing End-to_end TLS Security Leveraging NGINX with Intel(r) QuickAssist Technology and Open SL (20)

Serie dei nuovi processori Xeon Scalabili - Yashi Italia
Serie dei nuovi processori Xeon Scalabili - Yashi ItaliaSerie dei nuovi processori Xeon Scalabili - Yashi Italia
Serie dei nuovi processori Xeon Scalabili - Yashi Italia
 
QATCodec: past, present and future
QATCodec: past, present and futureQATCodec: past, present and future
QATCodec: past, present and future
 
Embedded Chief River Design-In Presentation_30442998.pdf
Embedded Chief River Design-In Presentation_30442998.pdfEmbedded Chief River Design-In Presentation_30442998.pdf
Embedded Chief River Design-In Presentation_30442998.pdf
 
Intel’s Big Data and Hadoop Security Initiatives - StampedeCon 2014
Intel’s Big Data and Hadoop Security Initiatives - StampedeCon 2014Intel’s Big Data and Hadoop Security Initiatives - StampedeCon 2014
Intel’s Big Data and Hadoop Security Initiatives - StampedeCon 2014
 
Edge Computing and 5G - SDN/NFV London meetup
Edge Computing and 5G - SDN/NFV London meetupEdge Computing and 5G - SDN/NFV London meetup
Edge Computing and 5G - SDN/NFV London meetup
 
z/OS V2R3 Communications Server Content Preview
z/OS V2R3 Communications Server Content Previewz/OS V2R3 Communications Server Content Preview
z/OS V2R3 Communications Server Content Preview
 
NFF-GO (YANFF) - Yet Another Network Function Framework
NFF-GO (YANFF) - Yet Another Network Function FrameworkNFF-GO (YANFF) - Yet Another Network Function Framework
NFF-GO (YANFF) - Yet Another Network Function Framework
 
DPDK IPSec performance benchmark ~ Georgii Tkachuk
DPDK IPSec performance benchmark ~ Georgii TkachukDPDK IPSec performance benchmark ~ Georgii Tkachuk
DPDK IPSec performance benchmark ~ Georgii Tkachuk
 
QNAP for IoT
QNAP for IoTQNAP for IoT
QNAP for IoT
 
Cisco Live! :: Introduction to IOS XR for Enterprises and Service Providers
Cisco Live! :: Introduction to IOS XR for Enterprises and Service ProvidersCisco Live! :: Introduction to IOS XR for Enterprises and Service Providers
Cisco Live! :: Introduction to IOS XR for Enterprises and Service Providers
 
Intel_IoT_gateway.pdf
Intel_IoT_gateway.pdfIntel_IoT_gateway.pdf
Intel_IoT_gateway.pdf
 
DAOS - Scale-Out Software-Defined Storage for HPC/Big Data/AI Convergence
DAOS - Scale-Out Software-Defined Storage for HPC/Big Data/AI ConvergenceDAOS - Scale-Out Software-Defined Storage for HPC/Big Data/AI Convergence
DAOS - Scale-Out Software-Defined Storage for HPC/Big Data/AI Convergence
 
Intel® QuickAssist Technology Introduction, Applications, and Lab, Including ...
Intel® QuickAssist Technology Introduction, Applications, and Lab, Including ...Intel® QuickAssist Technology Introduction, Applications, and Lab, Including ...
Intel® QuickAssist Technology Introduction, Applications, and Lab, Including ...
 
Intels presentation at blue line industrial computer seminar
Intels presentation at blue line industrial computer seminarIntels presentation at blue line industrial computer seminar
Intels presentation at blue line industrial computer seminar
 
Intel: How to Use Alluxio to Accelerate BigData Analytics on the Cloud and Ne...
Intel: How to Use Alluxio to Accelerate BigData Analytics on the Cloud and Ne...Intel: How to Use Alluxio to Accelerate BigData Analytics on the Cloud and Ne...
Intel: How to Use Alluxio to Accelerate BigData Analytics on the Cloud and Ne...
 
Introduction ciot workshop premeetup
Introduction ciot workshop premeetupIntroduction ciot workshop premeetup
Introduction ciot workshop premeetup
 
Lynn Comp - Big Data & Cloud Summit 2013
Lynn Comp - Big Data & Cloud Summit 2013Lynn Comp - Big Data & Cloud Summit 2013
Lynn Comp - Big Data & Cloud Summit 2013
 
Best Practice of Compression/Decompression Codes in Apache Spark with Sophia...
 Best Practice of Compression/Decompression Codes in Apache Spark with Sophia... Best Practice of Compression/Decompression Codes in Apache Spark with Sophia...
Best Practice of Compression/Decompression Codes in Apache Spark with Sophia...
 
Accelerate Ceph performance via SPDK related techniques
Accelerate Ceph performance via SPDK related techniques Accelerate Ceph performance via SPDK related techniques
Accelerate Ceph performance via SPDK related techniques
 
Quickassist adapter-8960-8970-brief
Quickassist adapter-8960-8970-briefQuickassist adapter-8960-8970-brief
Quickassist adapter-8960-8970-brief
 

Mais de Michelle Holley

Edge and 5G: What is in it for the developers?
Edge and 5G: What is in it for the developers?Edge and 5G: What is in it for the developers?
Edge and 5G: What is in it for the developers?Michelle Holley
 
5G and Open Reference Platforms
5G and Open Reference Platforms5G and Open Reference Platforms
5G and Open Reference PlatformsMichelle Holley
 
De-fogging Edge Computing: Ecosystem, Use-cases, and Opportunities
De-fogging Edge Computing: Ecosystem, Use-cases, and OpportunitiesDe-fogging Edge Computing: Ecosystem, Use-cases, and Opportunities
De-fogging Edge Computing: Ecosystem, Use-cases, and OpportunitiesMichelle Holley
 
Building the SD-Branch using uCPE
Building the SD-Branch using uCPEBuilding the SD-Branch using uCPE
Building the SD-Branch using uCPEMichelle Holley
 
Enabling Multi-access Edge Computing (MEC) Platform-as-a-Service for Enterprises
Enabling Multi-access Edge Computing (MEC) Platform-as-a-Service for EnterprisesEnabling Multi-access Edge Computing (MEC) Platform-as-a-Service for Enterprises
Enabling Multi-access Edge Computing (MEC) Platform-as-a-Service for EnterprisesMichelle Holley
 
Accelerating Edge Computing Adoption
Accelerating Edge Computing Adoption Accelerating Edge Computing Adoption
Accelerating Edge Computing Adoption Michelle Holley
 
OpenDaylight Update (June 2018)
OpenDaylight Update (June 2018)OpenDaylight Update (June 2018)
OpenDaylight Update (June 2018)Michelle Holley
 
Tungsten Fabric Overview
Tungsten Fabric OverviewTungsten Fabric Overview
Tungsten Fabric OverviewMichelle Holley
 
Orchestrating NFV Workloads in Multiple Clouds
Orchestrating NFV Workloads in Multiple CloudsOrchestrating NFV Workloads in Multiple Clouds
Orchestrating NFV Workloads in Multiple CloudsMichelle Holley
 
Convergence of device and data at the Edge Cloud
Convergence of device and data at the Edge CloudConvergence of device and data at the Edge Cloud
Convergence of device and data at the Edge CloudMichelle Holley
 
Intel® Network Builders - Network Edge Ecosystem Program
Intel® Network Builders - Network Edge Ecosystem ProgramIntel® Network Builders - Network Edge Ecosystem Program
Intel® Network Builders - Network Edge Ecosystem ProgramMichelle Holley
 
Design Implications, Challenges and Principles of Zero-Touch Management Envir...
Design Implications, Challenges and Principles of Zero-Touch Management Envir...Design Implications, Challenges and Principles of Zero-Touch Management Envir...
Design Implications, Challenges and Principles of Zero-Touch Management Envir...Michelle Holley
 
Using Microservices Architecture and Patterns to Address Applications Require...
Using Microservices Architecture and Patterns to Address Applications Require...Using Microservices Architecture and Patterns to Address Applications Require...
Using Microservices Architecture and Patterns to Address Applications Require...Michelle Holley
 
Intel Powered AI Applications for Telco
Intel Powered AI Applications for TelcoIntel Powered AI Applications for Telco
Intel Powered AI Applications for TelcoMichelle Holley
 
Artificial Intelligence in the Network
Artificial Intelligence in the Network Artificial Intelligence in the Network
Artificial Intelligence in the Network Michelle Holley
 
Service Mesh on Kubernetes with Istio
Service Mesh on Kubernetes with IstioService Mesh on Kubernetes with Istio
Service Mesh on Kubernetes with IstioMichelle Holley
 
Accelerating Virtual Machine Access with the Storage Performance Development ...
Accelerating Virtual Machine Access with the Storage Performance Development ...Accelerating Virtual Machine Access with the Storage Performance Development ...
Accelerating Virtual Machine Access with the Storage Performance Development ...Michelle Holley
 
Making Networking Apps Scream on Windows with DPDK
Making Networking Apps Scream on Windows with DPDKMaking Networking Apps Scream on Windows with DPDK
Making Networking Apps Scream on Windows with DPDKMichelle Holley
 
Enabling new protocol processing with DPDK using Dynamic Device Personalization
Enabling new protocol processing with DPDK using Dynamic Device PersonalizationEnabling new protocol processing with DPDK using Dynamic Device Personalization
Enabling new protocol processing with DPDK using Dynamic Device PersonalizationMichelle Holley
 

Mais de Michelle Holley (20)

Edge and 5G: What is in it for the developers?
Edge and 5G: What is in it for the developers?Edge and 5G: What is in it for the developers?
Edge and 5G: What is in it for the developers?
 
5G and Open Reference Platforms
5G and Open Reference Platforms5G and Open Reference Platforms
5G and Open Reference Platforms
 
De-fogging Edge Computing: Ecosystem, Use-cases, and Opportunities
De-fogging Edge Computing: Ecosystem, Use-cases, and OpportunitiesDe-fogging Edge Computing: Ecosystem, Use-cases, and Opportunities
De-fogging Edge Computing: Ecosystem, Use-cases, and Opportunities
 
Building the SD-Branch using uCPE
Building the SD-Branch using uCPEBuilding the SD-Branch using uCPE
Building the SD-Branch using uCPE
 
Enabling Multi-access Edge Computing (MEC) Platform-as-a-Service for Enterprises
Enabling Multi-access Edge Computing (MEC) Platform-as-a-Service for EnterprisesEnabling Multi-access Edge Computing (MEC) Platform-as-a-Service for Enterprises
Enabling Multi-access Edge Computing (MEC) Platform-as-a-Service for Enterprises
 
Accelerating Edge Computing Adoption
Accelerating Edge Computing Adoption Accelerating Edge Computing Adoption
Accelerating Edge Computing Adoption
 
DPDK & Cloud Native
DPDK & Cloud NativeDPDK & Cloud Native
DPDK & Cloud Native
 
OpenDaylight Update (June 2018)
OpenDaylight Update (June 2018)OpenDaylight Update (June 2018)
OpenDaylight Update (June 2018)
 
Tungsten Fabric Overview
Tungsten Fabric OverviewTungsten Fabric Overview
Tungsten Fabric Overview
 
Orchestrating NFV Workloads in Multiple Clouds
Orchestrating NFV Workloads in Multiple CloudsOrchestrating NFV Workloads in Multiple Clouds
Orchestrating NFV Workloads in Multiple Clouds
 
Convergence of device and data at the Edge Cloud
Convergence of device and data at the Edge CloudConvergence of device and data at the Edge Cloud
Convergence of device and data at the Edge Cloud
 
Intel® Network Builders - Network Edge Ecosystem Program
Intel® Network Builders - Network Edge Ecosystem ProgramIntel® Network Builders - Network Edge Ecosystem Program
Intel® Network Builders - Network Edge Ecosystem Program
 
Design Implications, Challenges and Principles of Zero-Touch Management Envir...
Design Implications, Challenges and Principles of Zero-Touch Management Envir...Design Implications, Challenges and Principles of Zero-Touch Management Envir...
Design Implications, Challenges and Principles of Zero-Touch Management Envir...
 
Using Microservices Architecture and Patterns to Address Applications Require...
Using Microservices Architecture and Patterns to Address Applications Require...Using Microservices Architecture and Patterns to Address Applications Require...
Using Microservices Architecture and Patterns to Address Applications Require...
 
Intel Powered AI Applications for Telco
Intel Powered AI Applications for TelcoIntel Powered AI Applications for Telco
Intel Powered AI Applications for Telco
 
Artificial Intelligence in the Network
Artificial Intelligence in the Network Artificial Intelligence in the Network
Artificial Intelligence in the Network
 
Service Mesh on Kubernetes with Istio
Service Mesh on Kubernetes with IstioService Mesh on Kubernetes with Istio
Service Mesh on Kubernetes with Istio
 
Accelerating Virtual Machine Access with the Storage Performance Development ...
Accelerating Virtual Machine Access with the Storage Performance Development ...Accelerating Virtual Machine Access with the Storage Performance Development ...
Accelerating Virtual Machine Access with the Storage Performance Development ...
 
Making Networking Apps Scream on Windows with DPDK
Making Networking Apps Scream on Windows with DPDKMaking Networking Apps Scream on Windows with DPDK
Making Networking Apps Scream on Windows with DPDK
 
Enabling new protocol processing with DPDK using Dynamic Device Personalization
Enabling new protocol processing with DPDK using Dynamic Device PersonalizationEnabling new protocol processing with DPDK using Dynamic Device Personalization
Enabling new protocol processing with DPDK using Dynamic Device Personalization
 

Último

Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 

Último (20)

Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 

Unleashing End-to_end TLS Security Leveraging NGINX with Intel(r) QuickAssist Technology and Open SL

  • 1. Unleashing End-To-End TLS Security Leveraging NGINX with Intel® QuickAssist Technology and OpenSSL-1.1.0
  • 2. 1. Market Trends 2. Overview of Intel® QuickAssist Technology 3. NGINX* -1.10 HTTPS Serving Results 4. OpenSSL* -1.1.0 Asynchronous Feature? 5. Summary Agenda! Copyright © 2016 Intel Corporation. All rights reserved. Intel, the Intel logo and Xeon are trademarks of Intel Corporation in the United States and/or other countries. *Other names and brands may be claimed as the property of others.
  • 3. 3 Encryption: Market Trends •  Largest sources of streaming applications (Netflix* & YouTube*) committed to using Https •  Video traffic continues to grow2 •  Mobile Traffic grew 74% in 20152 More Encrypted Traffic 70% of Internet Traffic Latin & North America will be Encrypted in 20161 1 Source: 2016 Global Internet Phenomena, Latin & North America, Sandvine* 2 Source: 2016 Cisco* Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2015–2020 White Paper •  Privacy •  Video •  Mobile •  Cloud Computing Copyright © 2016 Intel Corporation. All rights reserved. Intel, the Intel logo and Xeon are trademarks of Intel Corporation in the United States and/or other countries. *Other names and brands may be claimed as the property of others.
  • 4. 4 Enabling SDI for NFV & Hyperconvergence with Intel® QuickAssist Technology Compute Network Storage App 1 App 2 App 3 QuickAssist Static Purpose-built, Proprietary Resource Pool Orchestration SW App 1 App 2App 3 Dynamic Software Defined Infrastructure Compute Network Storage Copyright © 2016 Intel Corporation. All rights reserved. Intel, the Intel logo and Xeon are trademarks of Intel Corporation in the United States and/or other countries. *Other names and brands may be claimed as the property of others.
  • 5. 1. Market Trends 2. Overview of Intel® QuickAssist Technology 3. NGINX* -1.10 HTTPS Serving Results 4. OpenSSL* -1.1.0 Asynchronous Feature? 5. Summary Agenda! Copyright © 2016 Intel Corporation. All rights reserved. Intel, the Intel logo and Xeon are trademarks of Intel Corporation in the United States and/or other countries. *Other names and brands may be claimed as the property of others.
  • 6. Technology What it is, How it’s deployed •  Security (symmetric encryption and authentication) for data in flight and at rest Bulk Cryptography •  Secure Key Establishment (asymmetric encryption, digital signatures, key exchange) Public Key Cryptography •  Lossless data compression for data in flight and at rest Compression Intel® QuickAssist Technology integrates hardware acceleration of compute intensive workloads (specifically, cryptography & compression) on Intel® Architecture Platform Technology Chipset Connects to CPU via on-board PCI Express* lanes PCI Express* Plugin Card Connects to CPU via off-board PCI Express* lanes (slot) SoC Connects to CPU via on-chip interconnect Copyright © 2016 Intel Corporation. All rights reserved. Intel, the Intel logo and Xeon are trademarks of Intel Corporation in the United States and/or other countries. *Other names and brands may be claimed as the property of others.
  • 7. Intel® QuickAssist Technology: Crypto Usage Model •  Network security (IPsec, SSL/TLS), hashing for data- deduplication, encrypted storage Symmetric (Bulk) Cryptography •  Ciphers (AES, 3DES/DES, RC4, KASUMI*, Snow 3G) •  Wireless ciphers: KASUMI, Snow 3G •  Message digest/hash (MD5, SHA1, SHA2) •  Authentication (HMAC, AES in modes XCBC-MAC, CBC-MAC, CMAC, GMAC) •  Algorithm chaining (one cipher and one hash/authentication in a single operation) •  Authenticated encryption (AES-GCM, AES-CCM) Asymmetric (Public Key) Cryptography •  RSA key generation, encryption/decryption and digital signature generation/verification •  Elliptic Curve Cryptography: ECDSA, ECDHE •  Modular exponentiation for Diffie-Hellman (DH) •  DSA parameter generation and digital signature generation/ verification Intel® DH8955 PCH (Gen 1) Network Security Protocols TLS @ 4k records 50 Gbps Inline IPSec @ 512B Public Key Encryption RSA Decrypt 2K 40k Ops/sec TLS Handshakes with PFS ECDHE + RSA2K: 17.6K Ops/sec TLS Handshakes with PFS ECDHE + ECDSA: 20K Ops/sec Wireless Ciphers ZUC/Snow 3G/KASUMI* F82 20 Gbps Snow 3G 20 Gbps Cipher or Hash Only AES XTS 50Gbs SHA1, SHA256, SHA3, MD5 50Gbs 1.  Bulk Crypto uses AES-CBC-HMAC SHA1/256/SHA3 or AES GCM 2.  KASUMI-F8 (encryption) at 320B packets, 15 Gbs for 40B packets 3.  PFS = Perfect Forward Secrecy Results have been estimated based on internal Intel analysis and are provided for informational purposes only. Any difference in system hardware or software design or configuration may affect actual performance. Copyright © 2016 Intel Corporation. All rights reserved. Intel, the Intel logo and Xeon are trademarks of Intel Corporation in the United States and/or other countries. *Other names and brands may be claimed as the property of others.
  • 8. 8 Intel® QuickAssist Technology: Data Compression Usage Model •  Big data Acceleration •  WAN acceleration •  Http compression •  File System •  Databases Compression and Decompression Using the Following Algorithms •  DEFLATE: LZ77 compression followed by Huffman coding, with a gzip or zlib header Other Features •  Support for multiple history sizes with deflate •  Support for stateful (de)compression •  Supports Batch and Pack (seekable compression) •  Supports Chaining of Compression & Crypto for data integrity (SHAx, MD5) and data encryption with AES XTS, CBC •  Supports “Compress & Verify” Performance Intel® DH8955 PCH (Gen 1) Compression 24 Gbs1 Decompression 24 Gbs1 Compression + Decompression 24 Gbs1 1.  Dynamic Deflate Level 1 using 64KB buffer size 2.  Measured using Calgary and Silesia corpi Results have been estimated based on internal Intel analysis and are provided for informational purposes only. Any difference in system hardware or software design or configuration may affect actual performance. #NetworkZeroToSecureCopyright © 2016 Intel Corporation. All rights reserved. Intel, the Intel logo and Xeon are trademarks of Intel Corporation in the United States and/or other countries. *Other names and brands may be claimed as the property of others.
  • 9. 1. Market Trends 2. Overview of Intel® QuickAssist Technology 3. NGINX* -1.10 HTTPS Serving Results 4. OpenSSL* -1.1.0 Asynchronous Feature? 5. Summary Agenda! Copyright © 2016 Intel Corporation. All rights reserved. Intel, the Intel logo and Xeon are trademarks of Intel Corporation in the United States and/or other countries. *Other names and brands may be claimed as the property of others.
  • 10. Web Server Benchmark – Logical view 10 Client(s) HTTPS Server H1ps request, Session Establishment Encrypted Web Page Close ConnecAon NGINX* + OpenSSL-1.1.0* + Intel® QuickAssist Technology Engine on Standard Linux* HTTPS Requests Encrypted ConnecKons Bulk Throughput Test Application Data 0 Byte File Certificates RSA-2K ECDHE-RSA-2K (P256) ECDHE-ECDSA (P256) Protocol TLS v1.2 Cipher Suite AES_128_CBC_SHA Copyright © 2016 Intel Corporation. All rights reserved. Intel, the Intel logo and Xeon are trademarks of Intel Corporation in the United States and/or other countries. *Other names and brands may be claimed as the property of others.
  • 11. Web Server Key Exchange Details Source as of August 2016: Intel internal measurements with one E5-2699 v3 (18C, 2.3GHz, 145W), HSW-C1, HT & Turbo Enabled, NUMA & COD mode, Linux kernel: 3.11.10, gcc-4.8.3-7, BIOS GRNDCRB1.86B. 0032.R02.1405090848, OpenSSL-1.1.0. Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark* and MobileMark*, are measured using specific computer systems, components, software, operations and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products. Any difference in system hardware or software design or configuration may affect actual performance. Results have been estimated based on internal Intel analysis and are provided for informational purposes only. Any difference in system hardware or software design or configuration may affect actual performance. For more information go to http://www.intel.com/performance 1 1 Intel® QuickAssist Technology + OpenSSL*-1.1.0 Async gain over software! RSA-2K ~5.6x! ECDHE-RSA-2K ~3.7x! ECDHE-ECDSA ~1.25x*! * further improvements in development.
  • 12. 1. Market Trends 2. Overview of Intel® QuickAssist Technology 3. NGINX* -1.10 HTTPS Serving Results 4. OpenSSL* -1.1.0 Asynchronous Feature? 5. Summary Agenda! Copyright © 2016 Intel Corporation. All rights reserved. Intel, the Intel logo and Xeon are trademarks of Intel Corporation in the United States and/or other countries. *Other names and brands may be claimed as the property of others.
  • 13. Asynchronous OpenSSL* OpenSSL, an open-source implementation of the TLS protocols, is estimated to encrypt 66% of all active websites1 Asynchronous OpenSSL enables applications to get increased parallelism and throughput at lower costs 1 Source: Netcraft* April 2014 Web Server Survey Post Descriptor(s) Thread Completion Notification(s) Synchronous Mode, Multiple Threads/Processes Context Swap Post Descriptor(s) Thread Completion Notification(s) Asynchronous Mode, Single Thread/Process Copyright © 2016 Intel Corporation. All rights reserved. Intel, the Intel logo and Xeon are trademarks of Intel Corporation in the United States and/or other countries. *Other names and brands may be claimed as the property of others.
  • 14. New Features in 1.1.0 (associated with async) JOB Infrastructure Operations https://www.openssl.org/docs/manmaster/crypto/ASYNC_start_job.html •  Adds the ability for the engine to pause an existing operation flow (such as an SSL struct/ connection) and return to the calling application an error that indicates the JOB has been PAUSED. The application can then activate the JOB again at any time through the JOB infrastructure. (these are very light weight contexts). Event Notifications: https://www.openssl.org/docs/manmaster/ssl/SSL_get_all_async_fds.html •  These API’s access the event file descriptors associated with a SSL connection. These allow the application to query the active FD’s and subsequently use them in a call to select/epoll/ poll. SYNC/ASYNC Intel® QuickAssist Technology support: https://www.openssl.org/docs/manmaster/ssl/SSL_CTX_set_mode.html •  The API simply allows enabling a connection for async support. Pipelining: https://www.openssl.org/docs/manmaster/ssl/SSL_CTX_set_split_send_fragment.html •  Allows multiple SSL records (or encryption JOBs) to be submitted to the engine as a single request/API invocation. Copyright © 2016 Intel Corporation. All rights reserved. Intel, the Intel logo and Xeon are trademarks of Intel Corporation in the United States and/or other countries. *Other names and brands may be claimed as the property of others.
  • 15. Asynchronous Advantages Source as of August 2016: Intel internal measurements with one E5-2699 v3 (18C, 2.3GHz, 145W), HSW-C1, HT & Turbo Enabled, NUMA & COD mode, Linux kernel: 3.11.10, gcc-4.8.3-7, BIOS GRNDCRB1.86B. 0032.R02.1405090848, OpenSSL-1.1.0. Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark* and MobileMark*, are measured using specific computer systems, components, software, operations and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products. Any difference in system hardware or software design or configuration may affect actual performance. Results have been estimated based on internal Intel analysis and are provided for informational purposes only. Any difference in system hardware or software design or configuration may affect actual performance. For more information go to http://www.intel.com/performance Asynchronous support in OpenSSL*-1.1.0, combined with Intel® QuickAssist Technology and NGINX*-1.10 results in a 5.6 gain over software and 3.9 gain over synch invocation for the same configuration. Note: Measured using a single worker process per logical core. Configurations were kept consistent for each mode of operation; software, sync and async
  • 16. OpenSSL*-1.1.0 added JOB/Fibre support Encapsulates a running piece of work such as an SSL connection and allows it to be: Paused, woken up and signaling status JOB’s will be used to manage SSL connections Allowing a connection to pause at any point during processing. Jump directly back to that execution point JOB’s will have associated FD’s that an application can epoll/poll/select on JOB’s are based on the POSIX primitives: makecontext, getcontext, setjmp, longjmp Note: Start and Destroy context switches will be amortized across multiple calls. 1 6 EVP API ASYNC_start_job QAT EngineASYNC JOB RSA_sign QAT Driver cpaCyRsaDecrypt (non-blocking) ASYNC_pause_job ASYNC_FIBRE_swapcontext ASYNC_FIBRE_swapcontext RSA_sign ASYNC_start_job ASYNC_FIBRE_swapcontext rsa_decrypt delivery result return RSA sign result Copyright © 2016 Intel Corporation. All rights reserved. Intel, the Intel logo and Xeon are trademarks of Intel Corporation in the United States and/or other countries. *Other names and brands may be claimed as the property of others.
  • 17. QuickAssist Technology Features Intel QuickAssist Technology Engine released: https://github.com/01org/QAT_Engine Asymmetric PKE Offload •  RSA Support with PKCS1 Padding for Key Sizes 1024/2048/4096. •  DH Support for Key Sizes 768/1024/1536/2048/3072/4096. •  DSA Support for Key Sizes 160/1024, 224/2048, 256/2048, 256/3072. •  ECDH Support for the following curves: •  NIST Prime Curves: P-192/P-224/P-256/P-384/P-521. •  NIST Binary Curves: B-163/B-233/B-283/B-409/B-571. •  NIST Koblitz Curves: K-163/K-233/K-283/K409/K-571. •  ECDSA Support for the following curves: •  NIST Prime Curves: P-192/P-224/P-256/P-384/P-521. •  NIST Binary Curves: B-163/B-233/B-283/B-409/B-571. •  NIST Koblitz Curves: K-163/K-233/K-283/K409/K-571. Symmetric Chained Cipher Offload •  AES128-CBC-HMAC-SHA1/AES256-CBC-HMAC-SHA1. •  AES128-CBC-HMAC-SHA256/AES256-CBC-HMAC-SHA256. TLS/SSL specific algorithms •  Pseudo Random Function (PRF) offload. •  For TLSv1.2, v1.1 and SSLv3.0 Future Work •  Pipeline support Copyright © 2016 Intel Corporation. All rights reserved. Intel, the Intel logo and Xeon are trademarks of Intel Corporation in the United States and/or other countries. *Other names and brands may be claimed as the property of others.
  • 18. Modifications to NGINX* to support Event architecture in OpenSSL*-1.1.0 NGINX configuration: •  ‘ssl_asynch on;’ added to allow enabling per server block. This will enable all SSL connections for that server to run asynchronously if supported. ngx_connection_t: •  Each connection is aware of FD’s associated with an SSL_CTX (typically one). NGINX event notifications: •  JOB FD’s will notify NGINX of data availability on an asynchronous JOB from OpenSSL. As such they get added to the top level epoll FD instance. SSL connection events: •  Are treated as another event source, in a similar manner to socket read/write. To re-enable the JOB (source of the event) NGINX simply calls the associated SSL_* API (SSL_read, SSL_write, SSL_do_handshake etc.) Copyright © 2016 Intel Corporation. All rights reserved. Intel, the Intel logo and Xeon are trademarks of Intel Corporation in the United States and/or other countries. *Other names and brands may be claimed as the property of others.
  • 19. 1. Market Trends 2. Overview of Intel® QuickAssist Technology 3. NGINX* -1.10 HTTPS Serving Results 4. OpenSSL* -1.1.0 Asynchronous Feature? 5. Summary Agenda! Copyright © 2016 Intel Corporation. All rights reserved. Intel, the Intel logo and Xeon are trademarks of Intel Corporation in the United States and/or other countries. *Other names and brands may be claimed as the property of others.
  • 20. Summary •  Intel® QuickAssist Technology + NGINX*-1.10 + OpenSSL*-1.1.0 provide vast performance improvements for HTTPs transactions •  Engage with Intel Today to Optimize Crypto & Compression in your Workloads For further resources/information: •  For more information on Intel® QuickAssist Technology & Intel® QuickAssist Software Solutions can be found here: •  Software Package available at 01.org: Intel QuickAssist Technology | 01.org •  Intel® QuickAssist Technology engine for OpenSSL-1.1.0: https://github.com/01org/QAT_Engine •  For more details on Intel® QuickAssist Technology visit: http://www.intel.com/quickassist •  Intel Network Builders: https://networkbuilders.intel.com/ecosystem •  Intel QuickAssist Chipset: http://ark.intel.com/products/80372/Intel-DH8955-PCH •  Intel QuickAssist Adapter: http://ark.intel.com/products/79483/Intel-QuickAssist-Adapter-8950 •  OpenSSL 1.1.0 to Support Intel® QuickAssist and other optimizations •  http://www.servethehome.com/openssl-1-1-0-quickassist-optimizations/ •  OpenSSL Webinar: https://www.brighttalk.com/webcast/12229/172667 2 0 Copyright © 2016 Intel Corporation. All rights reserved. Intel, the Intel logo and Xeon are trademarks of Intel Corporation in the United States and/or other countries. *Other names and brands may be claimed as the property of others.
  • 21. Copyright © 2016 Intel Corporation. All rights reserved. Intel, the Intel logo and Xeon are trademarks of Intel Corporation in the United States and/or other countries. *Other names and brands may be claimed as the property of others. Questions?!