Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Openvpn bsdcrypto acceleration

    Off-Topic & Non-Support Discussion
    3
    31
    9.1k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • N
      newbieuser1234
      last edited by

      So essentially the dual core is slower for openvpn than an Alix 2d3 with a vpn1411 accelerator ?

      1 Reply Last reply Reply Quote 0
      • stephenw10S
        stephenw10 Netgate Administrator
        last edited by

        Well I would say no because of Databeestje's test report on the D510. He was seeing >50Mbps VPN traffic in one direction. The Alix can't manage that even with the Hifn accelerator.

        You haven't posted a complete output from openssl speed yet. That might show something.
        Coincidentally I have been playing around with an old firebox testing it's Safenet crypto card this evening. I've found some interesting things. Here's some output for comparrison:

        Without the Safenet 1141.

        [2.0.3-RELEASE][root@pfSense.localdomain]/root(1): openssl speed -evp aes-128-cbc
        
        Doing aes-128-cbc for 3s on 16 size blocks: 4443103 aes-128-cbc's in 2.89s
        Doing aes-128-cbc for 3s on 64 size blocks: 1258138 aes-128-cbc's in 2.91s
        Doing aes-128-cbc for 3s on 256 size blocks: 318359 aes-128-cbc's in 2.87s
        Doing aes-128-cbc for 3s on 1024 size blocks: 80907 aes-128-cbc's in 2.89s
        Doing aes-128-cbc for 3s on 8192 size blocks: 10450 aes-128-cbc's in 2.98s
        OpenSSL 0.9.8y 5 Feb 2013
        built on: date not available
        options:bn(64,32) md2(int) rc4(idx,int) des(ptr,risc1,16,long) aes(partial) blowfish(idx) 
        compiler: cc
        available timing options: USE_TOD HZ=128 [sysconf value]
        timing function used: getrusage
        The 'numbers' are in 1000s of bytes per second processed.
        type             16 bytes     64 bytes    256 bytes   1024 bytes   8192 bytes
        aes-128-cbc      24627.37k    27709.88k    28411.35k    28646.12k    28707.23k
        
        

        With the card:

        [2.0.3-RELEASE][root@pfSense.localdomain]/root(13): openssl speed -evp aes-128-cbc
        
        Doing aes-128-cbc for 3s on 16 size blocks: 117285 aes-128-cbc's in 0.14s
        Doing aes-128-cbc for 3s on 64 size blocks: 110095 aes-128-cbc's in 0.05s
        Doing aes-128-cbc for 3s on 256 size blocks: 93032 aes-128-cbc's in 0.04s
        Doing aes-128-cbc for 3s on 1024 size blocks: 56316 aes-128-cbc's in 0.05s
        Doing aes-128-cbc for 3s on 8192 size blocks: 8643 aes-128-cbc's in 0.00s
        OpenSSL 0.9.8y 5 Feb 2013
        built on: date not available
        options:bn(64,32) md2(int) rc4(idx,int) des(ptr,risc1,16,long) aes(partial) blowfish(idx) 
        compiler: cc
        available timing options: USE_TOD HZ=128 [sysconf value]
        timing function used: getrusage
        The 'numbers' are in 1000s of bytes per second processed.
        type             16 bytes     64 bytes    256 bytes   1024 bytes   8192 bytes
        aes-128-cbc      13690.32k   156398.83k   538937.61k  1147202.67k 70803456.00k
        
        

        The numbers make it look as though the card speeds things up massively but in reality my testing has showed that the box performs better, for OpenVPN at least, without the card in it. Moreover the card has to actually be removed from the box. No amount of selecting 'no hardware encryption' had any effect, which is how the OCF is supposed to work as I understand it. The wiki page exaplins this somewhat by saying that in reality VPN traffic is small blocks of data so the really big numbers are not any help.

        Steve

        1 Reply Last reply Reply Quote 0
        • N
          newbieuser1234
          last edited by

          $ openssl speed -evp aes-128-cbc
          OpenSSL 0.9.8y 5 Feb 2013
          built on: date not available
          options:bn(64,32) md2(int) rc4(idx,int) des(ptr,risc1,16,long) aes(partial) blowfish(idx)
          compiler: cc
          available timing options: USE_TOD HZ=128 [sysconf value]
          timing function used: getrusage
          The 'numbers' are in 1000s of bytes per second processed.
          type            16 bytes    64 bytes    256 bytes  1024 bytes  8192 bytes
          aes-128-cbc      20742.63k    22943.08k    23652.34k    23832.40k    23883.13k

          I get 7Mb on a 1gz, 1 gb of ram via neoware box.  smokes my dual core…

          $ openssl speed -evp aes-128-cbc
          OpenSSL 0.9.8y 5 Feb 2013
          built on: date not available
          options:bn(64,32) md2(int) rc4(idx,int) des(ptr,risc1,16,long) aes(partial) blowfish(idx)
          compiler: cc
          available timing options: USE_TOD HZ=128 [sysconf value]
          timing function used: getrusage
          The 'numbers' are in 1000s of bytes per second processed.
          type            16 bytes    64 bytes    256 bytes  1024 bytes  8192 bytes
          aes-128-cbc      38135.72k  190433.15k  884307.27k  2274631.30k  4013679.73k

          $ openssl speed -evp aes-128-cbc -engine via
          OpenSSL 0.9.8y 5 Feb 2013
          built on: date not available
          options:bn(64,32) md2(int) rc4(idx,int) des(ptr,risc1,16,long) aes(partial) blowfish(idx)
          compiler: cc
          available timing options: USE_TOD HZ=128 [sysconf value]
          timing function used: getrusage
          The 'numbers' are in 1000s of bytes per second processed.
          type            16 bytes    64 bytes    256 bytes  1024 bytes  8192 bytes
          aes-128-cbc      46147.44k  189884.01k  676914.89k  3349549.48k  6945314.10k

          Any way to test actual throughput?  iperf?

          1 Reply Last reply Reply Quote 0
          • stephenw10S
            stephenw10 Netgate Administrator
            last edited by

            It should do the Via probably has the Padlock encryption engine built in. But like I say above numbers aren't everything.  ;)

            Steve

            1 Reply Last reply Reply Quote 0
            • N
              newbieuser1234
              last edited by

              How are you testing throughput?

              1 Reply Last reply Reply Quote 0
              • stephenw10S
                stephenw10 Netgate Administrator
                last edited by

                A ridiculous long chain of machines!  :D
                An OpenVPN connection between two machines, the box I'm testing and one that's much more powerful to guarantee it's not slowing things down. I establish the VPN and then run iperf using the powerful end as the server and a laptop behind the test box as a client.
                I saw ~25Mbps with various encryption types with the card but ~33Mbps once I removed it.

                Steve

                1 Reply Last reply Reply Quote 0
                • N
                  newbieuser1234
                  last edited by

                  two machines on the same router, but different interfaces?

                  1 Reply Last reply Reply Quote 0
                  • stephenw10S
                    stephenw10 Netgate Administrator
                    last edited by

                    Yes as it happens they are connected via separate interfaces on my home router. They could just as easily have been connected directly though.

                    Steve

                    1 Reply Last reply Reply Quote 0
                    • N
                      newbieuser1234
                      last edited by

                      Thanks for the info. I'll try it out and see what results I get.  What setup do you like for the best bang for your buck for SMB users. 10 or less users.

                      1 Reply Last reply Reply Quote 0
                      • N
                        newbieuser1234
                        last edited by

                        I did your test with openvpn and iperf on seperate interfaces.  I got around 70 Mbits/sec. Far better than what the openssl test showed. weird stuff. thanks for your help.  Both the server and client were running in VM's so that may have slowed it down a bit too, not sure. I will try with standalone machines next.

                        1 Reply Last reply Reply Quote 0
                        • stephenw10S
                          stephenw10 Netgate Administrator
                          last edited by

                          Ah well there you go.  :)
                          About twice as fast as my Pentium 3 era Celeron 1200.
                          I was running 'top' on the console of the test box to make sure it was running at 100%, it could not pass more traffic. Also I tested the connection outside the VPN to make sure I wasn't being restricted by something else in the route. However if that's possible you have top be sure that the test traffic is actually using the VPN!  ;) I did that by using the WAN interface on the remote box to test the route and the LAN to test the VPN. The LAN address is only accessible over the VPN.

                          Steve

                          1 Reply Last reply Reply Quote 0
                          • N
                            newbieuser1234
                            last edited by

                            ill try the lan/wan test next.  I tried it where I had the client and server on different lan interfaces that couldn't talk to each other except for vpn.  when i disconnected the vpn, and tried without it on the same lan, i got 250Mb.  Is that normal for a gig interface? maybe the VM was limiting it some? They were on the same switch.

                            1 Reply Last reply Reply Quote 0
                            • stephenw10S
                              stephenw10 Netgate Administrator
                              last edited by

                              I would expect more from an Atom with Gigabit interfaces. Something >500Mbps.
                              It's not clear exactly how you had the test setup connected. If that's between two VMs connected to the same switch I would expect near Gigabit results, the traffic would not be going through the pfSense box at all.

                              It's very easy to overlook something and end up testing the wrong thing in these sorts of test.

                              Steve

                              1 Reply Last reply Reply Quote 0
                              • First post
                                Last post
                              Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.