On Mon, Oct 22, 2012 at 4:10 PM, Michael Sideris <[email protected]> wrote:
> It seems that changing to hmac-md5 boosted network throughput from
> ~50Mbit/s to ~100Mbit/s which is decent and reasonable. I am going to
> experiment a bit further with `scrub` options in pf.conf to see if I
> can squeeze more performance out of the link. The question now
> is....how much is security affected by using hmac-md5 vs the default
> hmac-sha2-256?

It's more a question of how often do you rekey? You also should not
disable Perfect Forward Secrecy that recomputes DH values every
time you renew your phase 2 key. And while there are no known
serious attacks on HMAC-MD5 it all depends on how important the
data that you're protecting is and if you have to be compliant with
any regulations that might mandate use of SHA2.

>  Should I consider using better CPUs on the servers in
> order to gain better performance through a stronger algorithm?
>

You can get 600-750Mbps (depending on the CPU speed) in the
AES-NI enabled setup (using AES-GCM that is).

> On Mon, Oct 22, 2012 at 2:58 PM, Mike Belopuhov <[email protected]> wrote:
>> On Tue, Oct 16, 2012 at 11:43 AM, Michael Sideris <[email protected]> wrote:
>>> Both endpoints run stock OpenBSD 5.1 (amd64). We use the VPN link to
>>> manage our platform remotely and perform daily backups. G-VPN runs on
>>> a 150Mbit/s link while L-VPN on a 1Gbit/s link. On one hand, our VPN
>>> setup runs really nicely. The connections are routed properly, pf is
>>> godsent and authpf works wonders. On the other hand, network
>>> throughput over the VPN tunnel never exceeds 3.4MB/s (ftp, scp, rsync,
>>> etc...)
>>>
>>> I welcome any suggestions. Keep in mind that this is our production
>>> VPN tunnel, so I cannot shut it down at will. Thanks in advance.
>>>
>>> ---
>>> Mike
>>>
>>
>> Hi,
>>
>> I suggest a couple of changes:
>>
>>  1) use cheaper hash function (md5 or at least sha1)
>>  2) use mss fixup so that your packets don't get fragmented
>>
>> The first point relates to your "ike" rules in ipsec.conf:
>>
>>     ike esp from $local_net to $remote_net peer $remote_ip \
>>         quick auth hmac-md5 enc aes
>>
>> The second point relates to pf rules in pf.conf:
>>
>>     match in scrub (max-mss 1440)
>>
>> You can experiment with the values in the 1400-1480 range.
>>
>> Also, please make sure that you don't run tcpbench or any
>> other benchmarking on the vpn gates themselves as it offsets
>> the measurements.

Reply via email to