Grant Henke created KUDU-3133: --------------------------------- Summary: Poor TLS cypher performance on Java 8 Key: KUDU-3133 URL: https://issues.apache.org/jira/browse/KUDU-3133 Project: Kudu Issue Type: Bug Components: security Reporter: Grant Henke
It was reported a while back that Kudu TLS doesn't perform well on Java 8 due to a potential GCM cypher bug or bad selection via `PREFERRED_CIPHER_SUITES`. It would be good to get to the bottom of this and fix it or document the recommendation to use Java 11. Here was the observed impact: {code} ./bin/ycsb run kudu -P workloads/workloadc -p operationcount=100000000 -threads 64 -p kudu_num_clients=16 -s -p fieldlength=10000 -p kudu_table_num_replicas=1 java 7u75 with master: 0205 11:18:48.647920 (+ 28us) server_negotiation.cc:581] Negotiated TLSv1 with cipher AES256-SHA SSLv3 Kx=RSA Au=RSA Enc=AES(256) Mac=SHA1 ~12k rows/sec java 8_141 with master: 0205 11:17:45.977107 (+ 31us) server_negotiation.cc:581] Negotiated TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH Au=RSA Enc=AESGCM(256) Mac=AEAD 6k rows/sec java 8_141 with GCM-based codecs removed from Negotiator.java 0205 11:25:33.268689 (+ 40us) server_negotiation.cc:581] Negotiated TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 TLSv1.2 Kx=ECDH Au=RSA Enc=AES(256) Mac=SHA384 ~6k rows/sec java 8_141 with only AES256-SHA remaining in Negotiator.java: "TLS_RSA_WITH_AES_256_CBC_SHA" ) 0205 11:32:07.674860 (+ 44us) server_negotiation.cc:581] Negotiated TLSv1.2 with cipher AES256-SHA SSLv3 Kx=RSA Au=RSA Enc=AES(256) Mac=SHA1 ~9.5k rows/sec java 11 with master: 0205 11:17:01.416066 (+ 41us) server_negotiation.cc:581] Negotiated TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH Au=RSA Enc=AESGCM(256) Mac=AEAD ~19k rows/sec {code} -- This message was sent by Atlassian Jira (v8.3.4#803005)