SSL Reuse not happening in s3 presigned urls
Maxim Dounin
mdounin at mdounin.ru
Sun Oct 1 21:13:31 UTC 2023
Hello!
On Sun, Oct 01, 2023 at 12:39:20AM +0530, Vijay Kumar Kamannavar wrote:
> Hello.
>
> I am using nginx reverse proxy for s3 presigned urls.
> I am running nginx as a container using nginx:1.25.2 debian image. My host
> has 16 Core and 32GB.
>
> Below is the nginx configuration.
>
> user nginx;
> worker_processes 14;
> pid /run/nginx.pid;
> worker_rlimit_nofile 40000;
> events {
> worker_connections 1024;
> }
> http {
> upstream s3_backend {
> server <mybucket>.s3.amazonaws.com:443;
> keepalive 10;
> }
>
> log_format combined_ssl '$remote_addr - $remote_user [$time_local] '
> '"$request" $status $body_bytes_sent '
> '"$http_referer" "$http_user_agent" '
> '$ssl_protocol/$ssl_cipher '
> '$ssl_session_reused';
> proxy_ssl_session_reuse on;
> proxy_ssl_server_name on;
Just a side note: with "proxy_ssl_server_name" nginx uses the name
as written in the "proxy_pass" directive during SSL handshake. In
your case, it is "s3_backend". Most likely, this is not what you
want to happen. If you do not want to send the name (which is the
default), consider removing the "proxy_ssl_server_name" directive
from your configuration. If you want to redefine the name,
consider using the "proxy_ssl_name" directive
(http://nginx.org/r/proxy_ssl_name).
[...]
> But in the log /var/log/nginx/ssl_debug.log, I see SSL Handshake every time
> when I request an S3 object via proxy using S3presigned URLs.
SSL handshake is expected to happen on each SSL connection
establishment. Depending on whether there is a cached SSL
session, SSL handshake can be full or abbreviated - with
abbreviated being more efficient.
>From the logs you've provided it looks like SSL handshakes to
upstream servers is your concern.
If you want to avoid SSL handshakes to upstream servers on
proxying, focus on keeping connections to upstream servers alive:
this should be possible as long as the upstream server supports it
and it is configured on nginx side (and it looks to be already
configured in your config).
Alternatively, check that SSL sessions are being reused - this
normally happens automatically for statically defined upstream
servers (unless explicitly disabled with "proxy_ssl_session_reuse
off;", see http://nginx.org/r/proxy_ssl_session_reuse).
>
> Below is the log I see every time for every request.
>
> 2023/09/30 18:07:19 [debug] 36#36: *9 event timer add: 22: 60000:721858477
> 2023/09/30 18:07:19 [debug] 36#36: *9 http finalize request: -4,
> "/blob/zte3odk1ymnl at CIBC-2mb
> /singleurl0?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=ASIASQOYQRM4CTRY6I54%2F20230930>
> 2023/09/30 18:07:19 [debug] 36#36: *9 http request count:2 blk:0
> 2023/09/30 18:07:19 [debug] 36#36: *9 http run request:
> "/blob/zte3odk1ymnl at CIBC-2mb
> /singleurl0?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=ASIASQOYQRM4CTRY6I54%2F20230930%2Fus-eas>
> 2023/09/30 18:07:19 [debug] 36#36: *9 http upstream check client, write
> event:1, "/blob/zte3odk1ymnl at CIBC-2mb/singleurl0"
> 2023/09/30 18:07:19 [debug] 36#36: *9 http upstream request:
> "/blob/zte3odk1ymnl at CIBC-2mb
> /singleurl0?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=ASIASQOYQRM4CTRY6I54%2F20230930%2Fu>
> 2023/09/30 18:07:19 [debug] 36#36: *9 http upstream send request handler
> 2023/09/30 18:07:19 [debug] 36#36: *9 malloc: 000055ED330A1DD0:96
> 2023/09/30 18:07:19 [debug] 36#36: *9 upstream SSL server name: "s3_backend"
> 2023/09/30 18:07:19 [debug] 36#36: *9 set session: 0000000000000000
Note: here nginx restores previously saved SSL session, yet there
are none. This suggests this is a first request to the upstream
server in question within the given nginx worker process.
> 2023/09/30 18:07:19 [debug] 36#36: *9 tcp_nodelay
> 2023/09/30 18:07:19 [debug] 36#36: *9 SSL_do_handshake: -1
> 2023/09/30 18:07:19 [debug] 36#36: *9 SSL_get_error: 2
> 2023/09/30 18:07:19 [debug] 36#36: *9 SSL handshake handler: 0
> 2023/09/30 18:07:19 [debug] 36#36: *9 SSL_do_handshake: -1
> 2023/09/30 18:07:19 [debug] 36#36: *9 SSL_get_error: 2
> 2023/09/30 18:07:19 [debug] 36#36: *9 SSL handshake handler: 1
> 2023/09/30 18:07:19 [debug] 36#36: *9 SSL_do_handshake: -1
> 2023/09/30 18:07:19 [debug] 36#36: *9 SSL_get_error: 2
> 2023/09/30 18:07:19 [debug] 36#36: *9 SSL handshake handler: 0
> 2023/09/30 18:07:19 [debug] 36#36: *9 SSL_do_handshake: -1
> 2023/09/30 18:07:19 [debug] 36#36: *9 SSL_get_error: 2
> 2023/09/30 18:07:19 [debug] 36#36: *9 SSL handshake handler: 1
> 2023/09/30 18:07:19 [debug] 36#36: *9 SSL_do_handshake: -1
> 2023/09/30 18:07:19 [debug] 36#36: *9 SSL_get_error: 2
> 2023/09/30 18:07:19 [debug] 36#36: *9 SSL handshake handler: 1
> 2023/09/30 18:07:19 [debug] 36#36: *9 SSL_do_handshake: -1
> 2023/09/30 18:07:19 [debug] 36#36: *9 SSL_get_error: 2
> 2023/09/30 18:07:19 [debug] 36#36: *9 SSL handshake handler: 0
> 2023/09/30 18:07:19 [debug] 36#36: *9 save session: 000055ED330FBAC0
Note: here nginx saves the SSL session which was established
during the handshake. This SSL session is expected to be used
during following handshakes in the same worker process.
> 2023/09/30 18:07:19 [debug] 36#36: *9 SSL_do_handshake: 1
> 2023/09/30 18:07:19 [debug] 36#36: *9 SSL: TLSv1.2, cipher:
> "ECDHE-RSA-AES128-GCM-SHA256 TLSv1.2 Kx=ECDH Au=RSA Enc=AESGCM(128)
> Mac=AEAD"
Note: here nginx logs handshake details. This handshake does not
reuse an SSL session, since there were none. If there was an SSL
session and it was correctly reused during the SSL handshake, the
next log line would be:
2023/09/30 18:07:19 [debug] 36#36: *9 SSL reused session
Check the following SSL handshakes in the same worker process to
see if sessions are actually reused or not.
Most likely, these sessions are properly reused, and everything
already works as it should.
> 2023/09/30 18:07:19 [debug] 36#36: *9 *http upstream ssl handshake*:
> "/blob/zte3odk1ymnl at CIBC-2mb
> /singleurl0?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=ASIASQOYQRM4CTRY6I54%2F202309>
> 2023/09/30 18:07:19 [debug] 36#36: *9 http upstream send request
> 2023/09/30 18:07:19 [debug] 36#36: *9 http upstream send request body
>
> If I run 4K clients using a simulator,I will see 100% CPU in the nginx
> container.I believe if we cache SSL sessions then SSL handshake for every
> request will be avoided hence we may not have high CPU at nginx container.
>
> Can you please help how to achieve SSL Cache? how to make sure the CPU is
> not high? Is there any reason why the CPU is high other than SSL Handshake.
As outlined above, most likely SSL session reuse to upstream
servers is already working properly in your setup.
Note though that SSL is generally costly, and you are using it for
both client connections and upstream connections. Depending on
the certificates being used, ciphers being used and so on costs
might vary, and there might be a room for improvement.
Hope this helps.
--
Maxim Dounin
http://mdounin.ru/
More information about the nginx
mailing list