Hello Eric,

On 1/30/2016 3:44 PM, Eric Chan wrote:
> Thank you all for your replies.
> Yes I want to accelerate the RSA and DHE operations also, which needs approx 
> 2 million CPU cycles per key pair if done in pure SW.  The Coleto Creek HW 
> will give big boost if we can get it to work.  AES-NI can help the bulk 
> traffic but not very helpful for Session setup.
> 

You should really be checking out ECDSA given that HAproxy now
transparently supports having both certificate types and serving
appropriate ones to supporting clients.

Next thing you want is making sure that you are correctly using TLS
tickets and distributing their keys to the whole cluster of HAproxy
nodes, as well as using keepalive to reuse existing connections instead
of tearing them at the end of every request.

In a decent;y sized environment getting several tens of millions
requests per day, statistics I gathered show that there is about 85-88%
of clients that support ECDSA. Using that and TLS keys, switching to
full HTTPS was barely noticeable when examining the CPU usage.

Regards,
Nenad

> Thanks,
> Eric
> 
> Sent from my iPhone
> 
> On Jan 30, 2016, at 4:09 AM, Lukas Tribus <[email protected]> wrote:
> 
>>> Now this is where I probably look stupid but...
>>>
>>> Am I correct in stating that the AES-NI is only really useful for file
>>> encryption... and bugger all use for HTTPS/SSL encryption (which is
>>> what we really want)?
>>
>> No, AES-NI is very useful for the symmetric part of HTTPS/TLS when
>> using AES ciphers:
>>
>> http://www.ietf.org/mail-archive/web/tls/current/msg09847.html
>> http://www.ietf.org/mail-archive/web/tls/current/msg09853.html
>> https://www.imperialviolet.org/2014/02/27/tlssymmetriccrypto.html
>> http://2013.diac.cr.yp.to/slides/gueron.pdf
>>
>>
>> It doesn't help with the asymmetric part (the TLS handshake) though.
>>
>>
>> Afaik major CDNs like Google and Cloudflare are not using TLS hardware,
>> because the benefits are questionable.
>>
>>
>>
>> Lukas
>>
>>
> This email and any attachments thereto may contain private, confidential, 
> and/or privileged material for the sole use of the intended recipient. Any 
> review, copying, or distribution of this email (or any attachments thereto) 
> by others is strictly prohibited. If you are not the intended recipient, 
> please contact the sender immediately and permanently delete the original and 
> any copies of this email and any attachments thereto.
> 

Reply via email to