bugzilla-daemon at mindrot.org
2020-Jul-18 17:33 UTC
[Bug 3194] New: Please consider lowering chacha20-poly1305@openssh.com cipher priority on AES-NI capable CPU
https://bugzilla.mindrot.org/show_bug.cgi?id=3194 Bug ID: 3194 Summary: Please consider lowering chacha20-poly1305 at openssh.com cipher priority on AES-NI capable CPU Product: Portable OpenSSH Version: 8.3p1 Hardware: amd64 OS: Linux Status: NEW Severity: enhancement Priority: P5 Component: Miscellaneous Assignee: unassigned-bugs at mindrot.org Reporter: fabio.pedretti at unibs.it Even in 8.3p1 (using libcrypto) chacha20-poly1305 at openssh.com is a lot slower than aes ciphers on AES-NI capable hardware. aes128-gcm at openssh.com is 23% faster on Xeon Westmere (the first Intel CPU with AES-NI) and 47% faster on Kaby Lake. On Kaby Lake: aes128-gcm at openssh.com : 540MB/s aes256-gcm at openssh.com : 535MB/s aes128-ctr : 445MB/s aes192-ctr : 446MB/s aes256-ctr : 436MB/s chacha20-poly1305 at openssh.com : 364MB/s Please consider making aes128-gcm at openssh.com the default. -- You are receiving this mail because: You are watching the assignee of the bug.
bugzilla-daemon at mindrot.org
2020-Jul-20 04:10 UTC
[Bug 3194] Please consider lowering chacha20-poly1305@openssh.com cipher priority on AES-NI capable CPU
https://bugzilla.mindrot.org/show_bug.cgi?id=3194 Damien Miller <djm at mindrot.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Resolution|--- |WONTFIX Status|NEW |RESOLVED CC| |djm at mindrot.org --- Comment #1 from Damien Miller <djm at mindrot.org> --- We don't plan on reordering ciphers based on local platform capabilities. We do offer the =^ trick to make it easy for users to do so. E.g. Ciphers ^aes256-gcm at openssh.com,aes128-gcm at openssh.com Will move those two ciphers to the head of the list. -- You are receiving this mail because: You are watching the assignee of the bug. You are watching someone on the CC list of the bug.
bugzilla-daemon at mindrot.org
2021-Apr-23 05:04 UTC
[Bug 3194] Please consider lowering chacha20-poly1305@openssh.com cipher priority on AES-NI capable CPU
https://bugzilla.mindrot.org/show_bug.cgi?id=3194 Damien Miller <djm at mindrot.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|RESOLVED |CLOSED --- Comment #2 from Damien Miller <djm at mindrot.org> --- closing resolved bugs as of 8.6p1 release -- You are receiving this mail because: You are watching someone on the CC list of the bug. You are watching the assignee of the bug.
Seemingly Similar Threads
- [Bug 2972] New: Add build-time option to use OpenSSL for ChaCha20-Poly1305
- how to pick cipher for AES-NI enabled AMD GX-412TC SOC tincd at 100% CPU
- how to pick cipher for AES-NI enabled AMD GX-412TC SOC tincd at 100% CPU
- [patch 1/2] use chacha20 from openssl (1.1.0+) when possible
- ChaCha20 Rekey Frequency