Thank you alot! I will try to repeat testing with -gcm today.

On Mon, Jul 22, 2013 at 10:16 AM, BARDOU Pierre <bardo...@mipih.fr> wrote:

> Hi,
>
> The testbed has been reused since I ran the tests, but the config was
> something standard like :
>
> ike esp from a.b.c.d/24  to e.f.g.h/24 peer i.j.k.l \
>         main auth hmac-sha1 enc aes-256 \
>         quick auth hmac-sha1 enc aes-256 psk "secret"
>
> If I remember well, for AES-GCM, there is no AUTH parameter, and it is
> phase 2 only. So it was something like :
> ike esp from a.b.c.d/24  to e.f.g.h/24 peer i.j.k.l \
>         main auth hmac-sha1 enc aes-256 \
>         quick enc aes-256-gcm psk "secret"
>
> If I've made syntax errors ipssecctl will tell you quickly btw.
>
> --
> Cordialement,
> Pierre BARDOU
>
> De : Evgeniy Sudyr [mailto:eject.in...@gmail.com]
> Envoyé : dimanche 21 juillet 2013 13:17
> À : BARDOU Pierre
> Cc : misc@openbsd.org
> Objet : Re: OpenBSD ipsec performance on modern HW
>
> All,
>
> during my tests I seen that CPU on all cores and memory usage was very low.
> Just interesting if there are any bottlenecks and how to fix them.
> 1) Does anybody care tcp stack tuning for high speed IPSEC ?
> 2) Can I run IPSEC (that's isakmpd ?) on other cores?
>
> Pierre,
> can you share your ipsec config to check same on my side.
>
>


--
--
With regards,
Eugene Sudyr

Reply via email to