If you're interested in compression information relating to SSL/TLS,
I'd also suggest asking on the openssl-dev list.  As of openssl 0.9.8,
zlib compression is used by default if the library is built with it;
however, it has also caused some issues with SSL compatibility
(leading to "invalid HMAC" alerts/connection drops).

-Kyle H

On 2/9/06, Nelson B <[EMAIL PROTECTED]> wrote:
> Steve Parkinson wrote:
>
> >> I understand there is a compression-negotiation feature in the SSL
> >> protocol.
>
> Yes, and there are some RFCs about it.
> http://www.rfc-editor.org/rfc/rfc3749.txt
> http://www.rfc-editor.org/rfc/rfc3943.txt
>
> >> But, it seems implementation of compression schemes for this is pretty
> >> rare. Is there a technical reason why?
>
> I cannot speak for the whole industry, but I can tell you historically
> why compression support is not yet found in NSS-based server products.
>
> When I started working on SSL at Netscape in 1997, one of my first
> projects was to explore the use of compression in SSL3.  Encryption
> was known to defeat the compression built into most modems, and the
> hope was that compressing before encryption would compensate for that.
>
> But there was a big performance concern.  It was well known that https
> servers got much lower throughput than http servers for the same sorts
> of traffic on the same hardware, largely due to the costs of CPU-based
> encryption.  The server market was very sensitive to price/performance,
> and the server products didn't want a feature that would further reduce
> the throughput associated with SSL.  It was feared that the added CPU
> cycle cost of compression would further reduce server throughput.
>
> On the other hand, it was hoped that compression would reduce the amount
> of text that needed to be encrypted enough that the sum of the added
> compression cost plus the reduced encryption cost would be a net
> reduction in the CPU cost of sending an encrypted SSL record.
>
> At that time, the best known compression algorithms were patented.
> (Perhaps they still are.)  Netscape had licensed a very fast compression
> library from the patent holder, and my job was to evaluate its effect on
> throughput and performance of SSL.
>
> To make a long story short, the result was that time cost of compression
> plus encryption was at best (that is, at least) 50% more than the cost of
> encryption alone, and often 100% more.  The message I got was that the
> server product teams were completely uninterested in a feature that
> would have such an effect on performance.  So, it was dropped, and never
> found its was into HCL, the predecessor of NSS.  Had it succeeded, it
> would have been my first opportunity to write an RFC.
>
> 7 years later, interest in compression was resurrected in the IETF-TLS
> working group, resulting in the publication of the above cited RFCs.
> Yet, despite their existence, we observe that it is still not widespread.
> Perhaps this has something to do with the patent status of the compression
> algorithms, or perhaps the performance issue is the same as before.
>
> >> Steve Parkinson
> >> Red Hat
>
> Regards,
> --
> Nelson B
> _______________________________________________
> dev-tech-crypto mailing list
> dev-tech-crypto@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-tech-crypto
>
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to