Offload-friendly network encryption in the kernel
The PSP security protocol enhances encryption efficiency by offloading tasks to NICs, supporting AES encryption. Despite benefits, concerns about unidirectional connections and standardization persist, prompting discussions on integration challenges.
Read original articleThe PSP security protocol aims to efficiently encrypt packets by offloading encryption and decryption to network interface cards (NICs, used by Google in data centers). PSP, encapsulated in UDP, reduces NIC state tracking for more connections. PSP requires NICs to generate keys, enhancing security. PSP uses AES-128-GCM or AES-256-GCM for encryption, supporting efficient hardware implementation. Despite benefits like reduced memory usage and scalability, concerns arise about PSP's unidirectional connections and lack of standardization. Kernel developers question adding PSP alongside existing protocols like IPsec and TLS. Technical challenges include retransmissions and key rekeying. While PSP offers advantages, its proprietary nature and implementation complexities raise doubts about standardization and widespread adoption. Discussions highlight the need for standard protocols and interoperability, emphasizing the importance of addressing technical concerns before integrating PSP into the Linux kernel.
Related
Confidentiality in the Face of Pervasive Surveillance
RFC 7624 addresses confidentiality threats post-2013 surveillance revelations. It defines attacker models, vulnerabilities, and encryption's role in protecting against eavesdropping, emphasizing Internet security enhancements against pervasive surveillance.
Protecting sshd using spiped (2012)
The article highlights spiped as a secure pipe daemon to protect sshd, offering a simpler alternative to 'ssh -L' by establishing a pre-shared secret key between hosts. Spiped enhances server security efficiently.
P4TC Hits a Brick Wall
P4TC, a networking device programming language, faces integration challenges into the Linux kernel's traffic-control subsystem. Hardware support, code duplication, and performance concerns spark debate on efficiency and necessity. Stalemate persists amid technical and community feedback complexities.
Why aren't we using SSH for everything? (2015)
SSH, known for secure server access, can extend to chat rooms, APIs, and file serving. Despite lacking HTTP/2 features, its encryption and authentication benefits raise questions on underutilization.
Unleashing 100 Mpps with Fd.io VPP on GCP x86
The article explores high-performance networking on Google Cloud Platform with DPDK, gVNIC, and FD.io VPP. It discusses the evolution of network technologies, NFV, DPDK's impact, and system requirements for efficient packet processing.
Related
Confidentiality in the Face of Pervasive Surveillance
RFC 7624 addresses confidentiality threats post-2013 surveillance revelations. It defines attacker models, vulnerabilities, and encryption's role in protecting against eavesdropping, emphasizing Internet security enhancements against pervasive surveillance.
Protecting sshd using spiped (2012)
The article highlights spiped as a secure pipe daemon to protect sshd, offering a simpler alternative to 'ssh -L' by establishing a pre-shared secret key between hosts. Spiped enhances server security efficiently.
P4TC Hits a Brick Wall
P4TC, a networking device programming language, faces integration challenges into the Linux kernel's traffic-control subsystem. Hardware support, code duplication, and performance concerns spark debate on efficiency and necessity. Stalemate persists amid technical and community feedback complexities.
Why aren't we using SSH for everything? (2015)
SSH, known for secure server access, can extend to chat rooms, APIs, and file serving. Despite lacking HTTP/2 features, its encryption and authentication benefits raise questions on underutilization.
Unleashing 100 Mpps with Fd.io VPP on GCP x86
The article explores high-performance networking on Google Cloud Platform with DPDK, gVNIC, and FD.io VPP. It discusses the evolution of network technologies, NFV, DPDK's impact, and system requirements for efficient packet processing.