On 2019-06-10, mabi <[email protected]> wrote:

> Bypassing the IPsec tunnel I get around 500 Mbit/s of bandwidth throughput 
> which is quite satisfying. The bandwidth throughput over my IPsec tunnel 
> achieves a max of 80 Mbit/s which I was sort of expecting with the default 
> encryption settings (auth hmac-sha2-256 enc aes-256).

It helps to understand that the authentication algorithm can require
as much or more CPU than the encryption.  HMAC-SHA2 is expensive.
On hardware that has AES-NI support, like the APU2 family, AES-GCM
is generally the fastest encryption/authentication combo.

> In order to increase bandwidth throughput over my IPsec tunnel I wanted to 
> know what you guys think is a good compromise between performance and 
> security? I was thinking for example of changing the encryption cipher to 
> aes-128 instead of aes-256 and maybe blowfish? What would you recommend?

AES-128 is good enough, although on the APU2 family with AES-NI it
seems to be only marginally faster than AES-256.

Don't use Blowfish.  It's obsolete.  And its reputation for speed
precedes the introduction of AES.

> Anything else I should be looking at? maybe like a hardware crypto 
> accellerator miniPCI card compatible with the APU4 and OpenBSD?

No, that was 15 years ago.

-- 
Christian "naddy" Weisgerber                          [email protected]

Reply via email to