Security
The following features for security are available as technology preview.
KTLS
Oracle Linux 9 provides kernel Transport Layer Security (KTLS) as a technology preview.
The Linux Kernel TLS (KTLS) handles TLS records for the AES-GCM cipher. KTLS also provides the interface for offloading TLS record encryption to NICs that support this functionality.
OpenSSL 3.0 is able to use KTLS if the enable-ktls
configuration option is
used during compiling.
The updated gnutls
packages can use KTLS for accelerating data transfer on
encrypted channels. To enable KTLS, add the tls.ko
kernel module using the
modprobe
command, and create a new configuration file
/etc/crypto-policies/local.d/gnutls-ktls.txt
for the system-wide
cryptographic policies with the following content:
[global] ktls = true
Note that gnutls
doesn't permit you to update traffic keys through TLS
KeyUpdate
messages, which impacts the security of AES-GCM ciphersuites.
QUIC Protocol in OpenSSL
OpenSSL clients can use the QUIC transport layer network protocol as a technical preview.
io_uring
Asynchronous I/O Interface
Although available, the io_uring
asynchronous I/O interface is disabled
by default. To enable the feature, set the kernel.io_uring_disabled
variable to any one of the following values when running the sysctl
command:
-
0
: All processes can createio_uring
instances as usual. -
1
: Creatingio_uring
is disabled for unprivileged processes. With this setting, theio_uring_setup
fails with the-EPERM
error. It only successfully completes if the calling process is privileged by theCAP_SYS_ADMIN
capability. However, existingio_uring
instances can still be used. -
2
(default): Creatingio_uring
creation is disabled for all processes. With this setting, theio_uring_setup
always fails with-EPERM
. However, existingio_uring
instances can still be used.
To use this feature, an updated version of the SELinux policy to enable the
mmap
system call on anonymous inodes is also required.
Note that io_uring
support has been available in UEK from UEK R6U3.