Thank you alot! I will try to repeat testing with -gcm today.
On Mon, Jul 22, 2013 at 10:16 AM, BARDOU Pierre <bardo...@mipih.fr> wrote: > Hi, > > The testbed has been reused since I ran the tests, but the config was > something standard like : > > ike esp from a.b.c.d/24 to e.f.g.h/24 peer i.j.k.l \ > main auth hmac-sha1 enc aes-256 \ > quick auth hmac-sha1 enc aes-256 psk "secret" > > If I remember well, for AES-GCM, there is no AUTH parameter, and it is > phase 2 only. So it was something like : > ike esp from a.b.c.d/24 to e.f.g.h/24 peer i.j.k.l \ > main auth hmac-sha1 enc aes-256 \ > quick enc aes-256-gcm psk "secret" > > If I've made syntax errors ipssecctl will tell you quickly btw. > > -- > Cordialement, > Pierre BARDOU > > De : Evgeniy Sudyr [mailto:eject.in...@gmail.com] > Envoyé : dimanche 21 juillet 2013 13:17 > à : BARDOU Pierre > Cc : misc@openbsd.org > Objet : Re: OpenBSD ipsec performance on modern HW > > All, > > during my tests I seen that CPU on all cores and memory usage was very low. > Just interesting if there are any bottlenecks and how to fix them. > 1) Does anybody care tcp stack tuning for high speed IPSEC ? > 2) Can I run IPSEC (that's isakmpd ?) on other cores? > > Pierre, > can you share your ipsec config to check same on my side. > > -- -- With regards, Eugene Sudyr