Hi, 

It depends a little on the hardware you're using, but yes, downgrading from 
sha512/aes256 to sha256/aes128 will have minimal impact on performance. The TLS 
channel parameters have hardly any impact on actual tunnel (data channel ) 
performance. 
I'm curious what speed you're getting - can you post some iperf numbers? 

HTH, 

JJK

 joh...@fastmail.com wrote:

>I'm reading up on performance for different encryption types.
>
>On my systems I can see the differences in speed you get with running
>
>       openssl speed ...
>
>In the initial OpenVpn config that I was given for the Server I'm using there's
>
>       auth RSA-SHA512
>       auth-nocache
>       cipher AES-256-CBC
>       ecdh-curve secp521r1
>       tls-cipher TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
>
>So I set my client to start with the same config.
>
>Everything works.
>
>As a simple test to increase the speed of downloads across the vpn, I dialed 
>down the security a little by switching both ends to 
>
>       auth RSA-SHA256
>       auth-nocache
>       cipher AES-128-CBC
>       ecdh-curve secp521r1
>       tls-cipher TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256
>
>But when I do a comparison of throughput, just by downloading big files over 
>the VPN link, I can't measure any real difference.
>
>Did I misunderstand how to improve performance by using lighter, smaller 
>crypto?  Maybe missed some other settings?
>
>Or is it just that crypto size isn't my bottleneck?
>
>- John
>
>------------------------------------------------------------------------------
>_______________________________________________
>Openvpn-users mailing list
>Openvpn-users@lists.sourceforge.net
>https://lists.sourceforge.net/lists/listinfo/openvpn-users
------------------------------------------------------------------------------
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to