mirror of
https://github.com/jart/cosmopolitan.git
synced 2025-05-16 18:40:16 +00:00
This change boosts SSL handshake performance from 2,627 to ~10,000 per second which is the same level of performance as NGINX at establishing secure connections. That's impressive if we consider that redbean is a forking frontend application server. This was accomplished by: 1. Enabling either SSL session caching or SSL tickets. We choose to use tickets since they reduce network round trips too and that's a more important metric than wrk'ing localhost. 2. Fixing mbedtls_mpi_sub_abs() which is the most frequently called function. It's called about 12,000 times during an SSL handshake since it's the basis of most arithmetic operations like addition and for some strange reason it was designed to make two needless copies in addition to calling malloc and free. That's now fixed. 3. Improving TLS output buffering during the SSL handshake only, so that only a single is write and read system call is needed until blocking on the ping pong. redbean will now do a better job wiping sensitive memory from a child process as soon as it's not needed. The nice thing about fork is it's much faster than reverse proxying so the goal is to use the different address spaces along with setuid() to minimize the risk that a server key will be compromised in the event that application code is hacked. |
||
---|---|---|
.. | ||
test | ||
aes.c | ||
aes.h | ||
aesni.c | ||
aesni.h | ||
asn1.h | ||
asn1parse.c | ||
asn1write.c | ||
asn1write.h | ||
base64.c | ||
base64.h | ||
bignum.c | ||
bignum.h | ||
bn_mul.h | ||
ccm.c | ||
ccm.h | ||
certs.c | ||
certs.h | ||
chacha20.c | ||
chacha20.h | ||
chachapoly.c | ||
chachapoly.h | ||
check.h | ||
cipher.c | ||
cipher.h | ||
cipher_internal.h | ||
cipher_wrap.c | ||
common.h | ||
config.h | ||
ctr_drbg.c | ||
ctr_drbg.h | ||
debug.c | ||
debug.h | ||
des.c | ||
des.h | ||
dhm.c | ||
dhm.h | ||
ecdh.c | ||
ecdh.h | ||
ecdsa.c | ||
ecdsa.h | ||
ecp.c | ||
ecp.h | ||
ecp_curves.c | ||
ecp_internal.h | ||
endian.h | ||
entropy.c | ||
entropy.h | ||
entropy_poll.c | ||
entropy_poll.h | ||
error.c | ||
error.h | ||
everest.c | ||
everest.h | ||
gcm.c | ||
gcm.h | ||
getalertdescription.c | ||
getciphersuitename.c | ||
hkdf.c | ||
hkdf.h | ||
hmac_drbg.c | ||
hmac_drbg.h | ||
iana.h | ||
isciphersuitegood.c | ||
LICENSE | ||
mbedtls.mk | ||
md.c | ||
md.h | ||
md5.c | ||
md5.h | ||
md_internal.h | ||
mdtype.c | ||
memory_buffer_alloc.c | ||
memory_buffer_alloc.h | ||
nist_kw.c | ||
nist_kw.h | ||
oid.c | ||
oid.h | ||
param.c | ||
pem.c | ||
pem.h | ||
pk.c | ||
pk.h | ||
pk_internal.h | ||
pk_wrap.c | ||
pkcs5.c | ||
pkcs5.h | ||
pkparse.c | ||
pktype.c | ||
pkwrite.c | ||
platform.c | ||
platform.h | ||
poly1305.c | ||
poly1305.h | ||
rando.c | ||
README.cosmo | ||
rsa.c | ||
rsa.h | ||
rsa_internal.c | ||
rsa_internal.h | ||
san.c | ||
san.h | ||
sha1.c | ||
sha1.h | ||
sha256.c | ||
sha256.h | ||
sha512.c | ||
sha512.h | ||
sigalg.c | ||
srtp.c | ||
ssl.h | ||
ssl_cache.c | ||
ssl_cache.h | ||
ssl_ciphersuites.c | ||
ssl_ciphersuites.h | ||
ssl_cli.c | ||
ssl_cookie.c | ||
ssl_cookie.h | ||
ssl_internal.h | ||
ssl_invasive.h | ||
ssl_msg.c | ||
ssl_srv.c | ||
ssl_ticket.c | ||
ssl_ticket.h | ||
ssl_tls.c | ||
ssl_tls13_keys.c | ||
ssl_tls13_keys.h | ||
version.h | ||
x509.c | ||
x509.h | ||
x509_create.c | ||
x509_crl.c | ||
x509_crl.h | ||
x509_crt.c | ||
x509_crt.h | ||
x509_csr.c | ||
x509_csr.h | ||
x509write_crt.c | ||
x509write_csr.c | ||
zeroize.c |
DESCRIPTION Mbed TLS is a crypto library built by ARM that's been released under a more permissive license than alternatives like OpenSSL and is useful for interoperating with systems that require TLS SOURCE https://github.com/ARMmbed/mbedtls/archive/refs/tags/v2.26.0.tar.gz LICENSE Apache 2.o LOCAL CHANGES - Reduce build+test latency from 15 seconds to 5 seconds. - Features have been added that enable this library to produce SSL certificates that can be used by Google Chrome. This required we add featurces for editing Subject Alternative Names and Extended Key Usage X.509 extension fields since upstream mbedtls can only do that currently for Netscape Navigator. - Local changes needed to be made to test_suite_ssl.datax due to it not taking into consideration disabled features like DTLS. - Local changes needed to be made to test_suite_x509parse.datax due to the features we added for subject alternative name parsing. - We've slimmed things down to meet our own specific local needs. For example, we don't need the PSA code since we don't target ARM hardware. We also don't need algorithms like camellia, blowfish, ripemd, arc4, ecjpake, etc. We want security code that's simple, readable, and easy to maintain. For example, the formally verified eliptic curve diffie-helman code was 38 files and most of it was dead code which could be consolidated into one < 1 kLOC file. - The only breaking API change that's been made is to redefine int arrays of things like long lists of ciphersuites to be uint8_t or uint16_t instead when appropriate. - Exported test code so it (a) doesn't have python as a build time dependency, (b) doesn't print to stdout on success, (c) bundles its dependencies inside a zip container so the tests are able to run hermetically if the binary is scp'd to some machine, and (d) doesn't have large amounts of duplicated generated code. - Fix mbedtls_mpi_sub_abs() to not call malloc/free/memcpy since it's called 11,124 times during as SSL handshake. - Make chacha20 26% faster. - Make base64 100x faster. - Make gcm faster.