On Fri, Nov 21, 2003, Richard Levitte - VMS Whacker wrote:

> Yesterday, people at Infrasec Sweden AB (http://www.infrasec.se/) and
> me spent the better part of the day tracing through a program that
> uses SSL with an nCipher box and figuring out what exactly made about
> every 15th SSL_accept stall for half a second.  We guessed there was
> something happening with creating session keys, so we took a closer
> look at random number generation, and lo and behold, at every stall,
> we saw RAND_bytes stall as well (about .4 s).
> 
> The stall might not be visible if it wasn't for a multithreaded server
> that gets harrassed with a ton of requests (all without any reusable
> information) per second.  Still, the stalls we saw were very clear
> performance degradations.
> 
> So, an idea could be, at least for the hw_ncipher.c/e_ncipher.c code
> to use the nCipher RNG only to seed the internal OpenSSL pool.  We
> made a hack yesterday that gave exactly that effect, and it gave much
> better performance than the .5s stalls about every 15th request :).
> 
> Thoughts?
> 

Was the application doing this because it set the nCipher box to be the
default RNG or was it some automatic behaviour when an nCipher box was
detected?

Steve.
--
Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage
OpenSSL project core developer and freelance consultant.
Funding needed! Details on homepage.
Homepage: http://drh-consultancy.demon.co.uk
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to