On 2/11/11 2:17 AM, Martin Koegler wrote: >> What do you mean "still get 20 Mbit"? You mean Megapixels/second? Or >> do you mean Megabits/second of throughput? Because without VeNCrypt, my > > I mean the value showen in the viewer info dialog. What tools are you using?
A thorough description of my methodology is here: http://www.virtualgl.org/pmwiki/uploads/About/vglperf21.pdf > I'm using Tigervnc (and had developeed it) for accessing normal > desktop in a secure way on Windows/Linux. In my option, VenCrypt > encryption works for this use case. > > Video / 3D are a different use case, which requires optimisations > (eg. there is even an optimized version of libjpeg). gnutls is used > with its default settings and I have not looked, how TLSOutput stream > blocks the data into packets and when the data is flushed to the > network. For your usecase, such analysis are probably necessary. All of the Internet chatter I'm seeing about it points to a fundamental performance limitation in GnuTLS. I don't think that optimizing the way we use it is going to help much. I guess what I'm interested in hearing is why GnuTLS is fundamentally better than SSh or libssh or even OpenSSL. I have a lot of experience with OpenSSL, and I know that it creates some overhead, but it's more on the order of 10% slower, not 2.5X slower than the unencrypted case. > The client should have all security types enabled by default (as > currently). I have no objections to modifying the list of default > security types in the server. I think we're in agreement, then. As long as TLSVnc doesn't pop up as the default when users use our software "out of the box", I am fine with leaving the feature in and letting the market decide whether it's useful or not. I would still be interested in knowing whether it would be feasible to use the auth extensions without GnuTLS. ------------------------------------------------------------------------------ The ultimate all-in-one performance toolkit: Intel(R) Parallel Studio XE: Pinpoint memory and threading errors before they happen. Find and fix more than 250 security defects in the development cycle. Locate bottlenecks in serial and parallel code that limit performance. http://p.sf.net/sfu/intel-dev2devfeb _______________________________________________ Tigervnc-devel mailing list Tigervnc-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/tigervnc-devel