[openssl-commits] [openssl] master update

Matt Caswell matt at openssl.org
Tue Jul 18 16:43:38 UTC 2017

The branch master has been updated
       via  0299f3f790437d124d15f60489c774407325f82b (commit)
      from  242525372c65d9c92fba970333ceb961abc24ce4 (commit)

- Log -----------------------------------------------------------------
commit 0299f3f790437d124d15f60489c774407325f82b
Author: Matt Caswell <matt at openssl.org>
Date:   Tue Jul 18 14:54:23 2017 +0100

    Add some performance notes about early data
    In particular add information about the effect of Nagle's algorithm on
    early data.
    Fixes #3906
    Reviewed-by: Ben Kaduk <kaduk at mit.edu>
    (Merged from https://github.com/openssl/openssl/pull/3955)


Summary of changes:
 doc/man3/SSL_read_early_data.pod | 24 ++++++++++++++++++++++++
 1 file changed, 24 insertions(+)

diff --git a/doc/man3/SSL_read_early_data.pod b/doc/man3/SSL_read_early_data.pod
index 38dffe5..f0237fa 100644
--- a/doc/man3/SSL_read_early_data.pod
+++ b/doc/man3/SSL_read_early_data.pod
@@ -168,6 +168,30 @@ In the event that the current maximum early data setting for the server is
 different to that originally specified in a session that a client is resuming
 with then the lower of the two values will apply.
+=head1 NOTES
+The whole purpose of early data is to enable a client to start sending data to
+the server before a full round trip of network traffic has occurred. Application
+developers should ensure they consider optimisation of the underlying TCP socket
+to obtain a performant solution. For example Nagle's algorithm is commonly used
+by operating systems in an attempt to avoid lots of small TCP packets. In many
+scenarios this is beneficial for performance, but it does not work well with the
+early data solution as implemented in OpenSSL. In Nagle's algorithm the OS will
+buffer outgoing TCP data if a TCP packet has already been sent which we have not
+yet received an ACK for from the peer. The buffered data will only be
+transmitted if enough data to fill an entire TCP packet is accumulated, or if
+the ACK is received from the peer. The initial ClientHello will be sent as the
+first TCP packet, causing the early application data from calls to
+SSL_write_early_data() to be buffered by the OS and not sent until an ACK is
+received for the ClientHello packet. This means the early data is not actually
+sent until a complete round trip with the server has occurred which defeats the
+objective of early data.
+In many operating systems the TCP_NODELAY socket option is available to disable
+Nagle's algorithm. If an application opts to disable Nagle's algorithm
+consideration should be given to turning it back on again after the handshake is
+complete if appropriate.
 SSL_write_early_data() returns 1 for success or 0 for failure. In the event of a

More information about the openssl-commits mailing list