Linux on IBM Z
Total Page:16
File Type:pdf, Size:1020Kb
Linux on IBM Z Pervasive Encryption with Linux on IBM Z: from a performance perspective Danijel Soldo Software Performance Analyst Linux on IBM Z Performance Evaluation _ [email protected] IBM Z / Danijel Soldo – Pervasive Encryption with Linux on IBM Z: from a performance perspective / © 2018 IBM Corporation Notices and disclaimers • © 2018 International Business Machines Corporation. No part of • Performance data contained herein was generally obtained in a this document may be reproduced or transmitted in any form controlled, isolated environments. Customer examples are without written permission from IBM. presented as illustrations of how those • U.S. Government Users Restricted Rights — use, duplication • customers have used IBM products and the results they may have or disclosure restricted by GSA ADP Schedule Contract with achieved. Actual performance, cost, savings or other results in IBM. other operating environments may vary. • Information in these presentations (including information relating • References in this document to IBM products, programs, or to products that have not yet been announced by IBM) has been services does not imply that IBM intends to make such products, reviewed for accuracy as of the date of initial publication programs or services available in all countries in which and could include unintentional technical or typographical IBM operates or does business. errors. IBM shall have no responsibility to update this information. This document is distributed “as is” without any warranty, • Workshops, sessions and associated materials may have been either express or implied. In no event, shall IBM be liable for prepared by independent session speakers, and do not necessarily any damage arising from the use of this information, reflect the views of IBM. All materials and discussions are provided including but not limited to, loss of data, business for informational purposes only, and are neither intended to, nor interruption, loss of profit or loss of opportunity. shall constitute legal or other guidance or advice to any individual IBM products and services are warranted per the terms and participant or their specific situation. conditions of the agreements under which they are provided. • It is the customer’s responsibility to insure its own compliance • IBM products are manufactured from new parts or new and used with legal requirements and to obtain advice of competent legal parts. counsel as to the identification and interpretation of any In some cases, a product may not be new and may have been relevant laws and regulatory requirements that may affect the previously installed. Regardless, our warranty terms apply.” customer’s business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice • Any statements regarding IBM's future direction, intent or or represent or warrant that its services or products will ensure that product plans are subject to change or withdrawal without the customer follows any law. notice. IBM Z / Danijel Soldo – Pervasive Encryption with Linux on IBM Z: from a performance perspective / © 2018 IBM Corporation 2 Notices and disclaimers • Information concerning non-IBM products was obtained from the suppliers of • IBM, the IBM logo, ibm.com and [names of other referenced those products, their published announcements or other publicly available IBM products and services used in the presentation] are sources. IBM has not tested those products about this publication and trademarks of International Business Machines Corporation, cannot confirm the accuracy of performance, compatibility or any other registered in many jurisdictions worldwide. Other product and claims related to non-IBM products. Questions on the capabilities of non-IBM service names might be trademarks of IBM or other products should be addressed to the suppliers of those products. IBM does companies. A current list of IBM trademarks is available on not warrant the quality of any third-party products, or the ability of any such the Web at "Copyright and trademark information" at: third-party products to interoperate with IBM’s products. IBM expressly www.ibm.com/legal/copytrade.shtml. disclaims all warranties, expressed or implied, including but not limited to, the implied warranties of merchantability and fitness for a purpose. • Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. • The provision of the information contained herein is not intended to, and does not, grant any right or license under any IBM patents, copyrights, • Other product and service names might be trademarks of IBM trademarks or other intellectual property right. or other companies. IBM Z / Danijel Soldo – Pervasive Encryption with Linux on IBM Z: from a performance perspective / © 2018 IBM Corporation 3 th July 17 , 2017 – the Announcement Sources: https://www.wired.com/story/ibm-z-mainframe-encryption/ https://techcrunch.com/2017/07/16/ibm-dangles-carrot-of-full-encryption-to-lure-buyers-to- new-z14-mainframe/ https://www.cnbc.com/2017/07/17/ibm-unveils-new-mainframe-capable-of-running-more- 4 IBM Z / Danijel Soldo – Pervasive Encryption with Linux on IBM Z: from a performance perspective / © 2018 IBM Corporation than-12-billion-encrypted-transactions-a-day.html Agenda Pervasive Encryption in Linux Data-in-flight encryption performance Data-at-rest encryption performance End-to-End scenario Encrypt everything. IBM Z / Danijel Soldo – Pervasive Encryption with Linux on IBM Z: from a performance perspective / © 2018 IBM Corporation 5 Pervasive Encryption in Linux - What is the idea? l Encrypt everything. Shift from selective to pervasive encryption without violating SLAs. - Why has it become a hot topic recently? l GDPR, PCI-DSS and other regulations force enterprises to provide data protection. l Recent improvements introduced with the z14 made it possible. Great performance improvements in critical crypto workloads. - But how is it implemented with Linux on IBM Z? IBM Z / Danijel Soldo – Pervasive Encryption with Linux on IBM Z: from a performance perspective / © 2018 IBM Corporation 6 Pervasive Encryption in Linux Network security or data-in-flight encryption • TLS, IPSec • Measured via symmetric encryption throughput and asymmetric handshakes volume • AES modes measured: CBC, GCM, XTS IBM Z / Danijel Soldo – Pervasive Encryption with Linux on IBM Z: from a performance perspective / © 2018 IBM Corporation 7 Pervasive Encryption in Linux Network security or data-in-flight encryption • TLS, IPSec • Measured via symmetric encryption throughput and asymmetric handshakes volume • AES modes measured: CBC, GCM, XTS Full volume encryption or data-at-rest encryption • dm-crypt / LUKS • Measured via disk IO stress tool throughput and CPU consumption • Different sector sizes and encryption keys compared IBM Z / Danijel Soldo – Pervasive Encryption with Linux on IBM Z: from a performance perspective / © 2018 IBM Corporation 8 Pervasive Encryption in Linux Network security or data-in-flight encryption • TLS, IPSec • Measured via symmetric encryption throughput and asymmetric handshakes volume • AES modes measured: CBC, GCM, XTS Full volume encryption or data-at-rest encryption • dm-crypt / LUKS • Measured via disk IO stress tool throughput and CPU consumption • Different sector sizes and encryption keys compared Secure Service Container • Simple and highly secure environment to run an appliance • Secure boot, encryption and reduced attack surface IBM Z / Danijel Soldo – Pervasive Encryption with Linux on IBM Z: from a performance perspective / © 2018 IBM Corporation 9 Data-in-Flight: Overview TLS/SSL TLS Handshake Data buffer encryption (asymmetric) (symmetric) IBM Z / Danijel Soldo – Pervasive Encryption with Linux on IBM Z: from a performance perspective / © 2018 IBM Corporation 10 Data-in-Flight: Overview TLS/SSL TLS Handshake Data buffer encryption (asymmetric) (symmetric) RSA, DH, ECDHE, ECDSA AES CEX exploitation CPACF exploitation OpenSSL s_time OpenSSL speed OpenSSL s_time: establishing a max number of TLS/SSL connections with clients in a given time slot. OpenSSL speed: encrypting/decrypting a max possible amount of data in a given time slot. IBM Z / Danijel Soldo – Pervasive Encryption with Linux on IBM Z: from a performance perspective / © 2018 IBM Corporation 11 Data-in-Flight: TLS Handshakes LPAR z13/z14 Intel x86 Server Client TLS/SSL Client – x86 system OpenSSL cipher suites Server – z13/z14 LPAR Intel(R) Xeon(R) CPU E5-2690 TLS_RSA_WITH_AES_256_CBC_SHA256 4 IFLs + SMT-2 16 cores (2 thread per core) TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 2 GB Memory 2 GB Memory TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 CEX5S/CEX6S Accelerator OpenSSL 1.0.2h TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 OpenSSL 1.0.2j IBM Z / Danijel Soldo – Pervasive Encryption witH Linux on IBM Z: from a performance perspective / © 2018 IBM Corporation 12 Data-in-Flight: TLS Handshakes Connections per second: 2kB data and 2048 bit RSA Key TLS_RSA_WITH_AES_256_CBC_SHA256 Crypto Express Card Acceleration l Key Exchange: RSA l Encryption: AES-256-CBC l Authentication: RSA l MAC: SHA256 OpenSSL s_time connection A connection is defined as: better the establishment of a TLS session between the client and server, the exchange of fixed size random data and a session disconnect. *All values are normalized to the z13-1client case (100 conn/s) IBM Z / Danijel Soldo – Pervasive Encryption with Linux on IBM Z: from a Performance Perspective / © 2018 IBM CorPoration 13 Data-in-Flight: