While I am not required to comply with any particular crypto
standards, I have NFS data passing through that link which I would
classify as....fairly sensitive. That being said, I am not sure how to
check the re-keying frequency except watching `ipsecctl -m`. I am not
sure if PFS is enabled by default on a stock OpenBSD 5.1 installation
so I would appreciate it if you could tell me how I can check that.

Performance wise I would be happy if I could squeeze ~100 out of the
150Mbit/s link. At the moment I am struggling to reach ~100Mbit/s and
that is with hmac-md5. I would like to find a reasonable balance
between performance and security but it seems that hmac-sha2-256 is
too "expensive" for my hardware.  I really thought dual Xeons @ 2.8GHz
would be up to the task.

On Mon, Oct 22, 2012 at 6:41 PM, Mike Belopuhov <[email protected]> wrote:
> On Mon, Oct 22, 2012 at 4:10 PM, Michael Sideris <[email protected]> wrote:
>> It seems that changing to hmac-md5 boosted network throughput from
>> ~50Mbit/s to ~100Mbit/s which is decent and reasonable. I am going to
>> experiment a bit further with `scrub` options in pf.conf to see if I
>> can squeeze more performance out of the link. The question now
>> is....how much is security affected by using hmac-md5 vs the default
>> hmac-sha2-256?
>
> It's more a question of how often do you rekey? You also should not
> disable Perfect Forward Secrecy that recomputes DH values every
> time you renew your phase 2 key. And while there are no known
> serious attacks on HMAC-MD5 it all depends on how important the
> data that you're protecting is and if you have to be compliant with
> any regulations that might mandate use of SHA2.
>
>>  Should I consider using better CPUs on the servers in
>> order to gain better performance through a stronger algorithm?
>>
>
> You can get 600-750Mbps (depending on the CPU speed) in the
> AES-NI enabled setup (using AES-GCM that is).
>
>> On Mon, Oct 22, 2012 at 2:58 PM, Mike Belopuhov <[email protected]> wrote:
>>> On Tue, Oct 16, 2012 at 11:43 AM, Michael Sideris <[email protected]> wrote:
>>>> Both endpoints run stock OpenBSD 5.1 (amd64). We use the VPN link to
>>>> manage our platform remotely and perform daily backups. G-VPN runs on
>>>> a 150Mbit/s link while L-VPN on a 1Gbit/s link. On one hand, our VPN
>>>> setup runs really nicely. The connections are routed properly, pf is
>>>> godsent and authpf works wonders. On the other hand, network
>>>> throughput over the VPN tunnel never exceeds 3.4MB/s (ftp, scp, rsync,
>>>> etc...)
>>>>
>>>> I welcome any suggestions. Keep in mind that this is our production
>>>> VPN tunnel, so I cannot shut it down at will. Thanks in advance.
>>>>
>>>> ---
>>>> Mike
>>>>
>>>
>>> Hi,
>>>
>>> I suggest a couple of changes:
>>>
>>>  1) use cheaper hash function (md5 or at least sha1)
>>>  2) use mss fixup so that your packets don't get fragmented
>>>
>>> The first point relates to your "ike" rules in ipsec.conf:
>>>
>>>     ike esp from $local_net to $remote_net peer $remote_ip \
>>>         quick auth hmac-md5 enc aes
>>>
>>> The second point relates to pf rules in pf.conf:
>>>
>>>     match in scrub (max-mss 1440)
>>>
>>> You can experiment with the values in the 1400-1480 range.
>>>
>>> Also, please make sure that you don't run tcpbench or any
>>> other benchmarking on the vpn gates themselves as it offsets
>>> the measurements.

Reply via email to