bugzilla-daemon at mindrot.org
2020-Jul-18 17:33 UTC
[Bug 3194] New: Please consider lowering chacha20-poly1305@openssh.com cipher priority on AES-NI capable CPU
https://bugzilla.mindrot.org/show_bug.cgi?id=3194
Bug ID: 3194
Summary: Please consider lowering chacha20-poly1305 at openssh.com
cipher priority on AES-NI capable CPU
Product: Portable OpenSSH
Version: 8.3p1
Hardware: amd64
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: Miscellaneous
Assignee: unassigned-bugs at mindrot.org
Reporter: fabio.pedretti at unibs.it
Even in 8.3p1 (using libcrypto) chacha20-poly1305 at openssh.com is a lot
slower than aes ciphers on AES-NI capable hardware.
aes128-gcm at openssh.com is 23% faster on Xeon Westmere (the first Intel
CPU with AES-NI) and 47% faster on Kaby Lake.
On Kaby Lake:
aes128-gcm at openssh.com : 540MB/s
aes256-gcm at openssh.com : 535MB/s
aes128-ctr : 445MB/s
aes192-ctr : 446MB/s
aes256-ctr : 436MB/s
chacha20-poly1305 at openssh.com : 364MB/s
Please consider making aes128-gcm at openssh.com the default.
--
You are receiving this mail because:
You are watching the assignee of the bug.
bugzilla-daemon at mindrot.org
2020-Jul-20 04:10 UTC
[Bug 3194] Please consider lowering chacha20-poly1305@openssh.com cipher priority on AES-NI capable CPU
https://bugzilla.mindrot.org/show_bug.cgi?id=3194
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Resolution|--- |WONTFIX
Status|NEW |RESOLVED
CC| |djm at mindrot.org
--- Comment #1 from Damien Miller <djm at mindrot.org> ---
We don't plan on reordering ciphers based on local platform
capabilities. We do offer the =^ trick to make it easy for users to do
so. E.g.
Ciphers ^aes256-gcm at openssh.com,aes128-gcm at openssh.com
Will move those two ciphers to the head of the list.
--
You are receiving this mail because:
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.
bugzilla-daemon at mindrot.org
2021-Apr-23 05:04 UTC
[Bug 3194] Please consider lowering chacha20-poly1305@openssh.com cipher priority on AES-NI capable CPU
https://bugzilla.mindrot.org/show_bug.cgi?id=3194
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|RESOLVED |CLOSED
--- Comment #2 from Damien Miller <djm at mindrot.org> ---
closing resolved bugs as of 8.6p1 release
--
You are receiving this mail because:
You are watching someone on the CC list of the bug.
You are watching the assignee of the bug.
Seemingly Similar Threads
- [Bug 2972] New: Add build-time option to use OpenSSL for ChaCha20-Poly1305
- how to pick cipher for AES-NI enabled AMD GX-412TC SOC tincd at 100% CPU
- how to pick cipher for AES-NI enabled AMD GX-412TC SOC tincd at 100% CPU
- [patch 1/2] use chacha20 from openssl (1.1.0+) when possible
- ChaCha20 Rekey Frequency