On Sun, May 14, 2006 at 02:49:41PM +0000, gmu 2k6 wrote:

> with the tcp/ip-listening services it will allow us to make use
> of TLS in EDH mode but what is the best way when one
> for performance reasons wants no encryption:
> e1) DH with a shared secret?
> e2) just tell admins to make sure they do not allow any
> connections from outside the distributed system and
> possibly use a VLAN?
> e3) I'm still reading Eric Rescorla's book but beforehand,
> is there a TLS mode which does authentication only
> and for performance reason use a NULL cipher for the traffic?
> 
> moreover I'd like to know if I have to secure saved sessions
> explicitly when I come to the conclusion that session saving
> is needed just because the connection overhead with TLS is
> too much?

Premature optimization is the root of all evil. First use the
default TLS ciphers and figure out whether you are in fact
running into performance issues.

Bulk encryption is generally fast enough (~50MB/s per CPU...) that you
saturate most network interfaces well before you run out of CPU. If you
have multiple Gigabyte interfaces, you can disable encryption (the eNULL
ciphersuite), but then you lose data-integrity

Connection setup is more expensive, but is this a real issue for you?
If so implement an external TLS session cache.

If RSA connection overhead is still too high, and all clients and servers
are in the same organization, you could use Kerberos 5 via GSSAPI+SASL,
and have SASL take care of may of the details. If bulk encryptio is not
prohibitive, allow SASL to negotiate a security layer and use the appropriate
I/O callbacks instead of direct read/write operations.

Your questions are too broad to provide more concrete answers.

-- 
        Viktor.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to