pher would
offer much improvement -- and some of the available crypto
accelerators
don't perform Diffie-Helmann or AES, some do.
I myself have a ubsec(4) card, and even when I hacked OpenSSH to use
OpenSSL engine support by default (with someone else's patch), I
didn't
see that much
hi,
Just jumping in here. The Soekris 1401 offers only limited
performance enhancements. If you read the specs, it is only useful
(and used?) for certain encryption algorithms. Its also deprecated
and would imagine that Soren regrets even releasing it in the first
place.
None the les
Mike Tancsa wrote:
On Mon, 17 Apr 2006 16:44:38 -1000 (HST), in sentex.lists.freebsd.net
you wrote:
I've read here before (or maybe some other freebsd list) that cards
like the Soekris 1401 don't gain as much as you'd expect due to moving
packets to/from the card over the PCI bus. But the cont
ng them
> > into some machines that provide logins over ssh. These machines are
> > generally pretty good spec, 2.4GHz+, 1GB RAM, Intel MBs, mostly
> > on-board peripherals.
>
> Given that spec of machine, I don't see that a hardware cipher would
> offer much improve
On Mon, 17 Apr 2006 16:44:38 -1000 (HST), in sentex.lists.freebsd.net
you wrote:
>I've read here before (or maybe some other freebsd list) that cards
>like the Soekris 1401 don't gain as much as you'd expect due to moving
>packets to/from the card over the PCI bus. But the context is usually
>one
ome machines that provide logins over ssh. These machines are
> generally pretty good spec, 2.4GHz+, 1GB RAM, Intel MBs, mostly
> on-board peripherals.
Given that spec of machine, I don't see that a hardware cipher would
offer much improvement -- and some of the available crypto accelerato
I've read here before (or maybe some other freebsd list) that cards
like the Soekris 1401 don't gain as much as you'd expect due to moving
packets to/from the card over the PCI bus. But the context is usually
one of trying to encrypt packets to increase throughput.
So the question is whether thes