Bug 5617 - multi-threaded AES CTR in OpenSSH
Summary: multi-threaded AES CTR in OpenSSH
Status: CLOSED WONTFIX
Alias: None
Product: ThinLinc
Classification: Unclassified
Component: Client (show other bugs)
Version: pre-1.0
Hardware: PC Unknown
: P2 Normal
Target Milestone: 4.14.0
Assignee: Bugzilla mail exporter
URL:
Keywords:
Depends on: 5615
Blocks: 1584
  Show dependency treegraph
 
Reported: 2015-08-25 15:04 CEST by Pierre Ossman
Modified: 2021-09-23 15:27 CEST (History)
1 user (show)

See Also:
Acceptance Criteria:


Attachments

Description Pierre Ossman cendio 2015-08-25 15:04:05 CEST
Split from bug 1584.

We need to investigate if we can boost performance of OpenSSH on multi-core systems by multi-threading the AES CTR handling. One implementation of that is done here:

http://www.psc.edu/networking/projects/hpn-ssh/

There are some hurdles though:

 - It bypasses OpenSSL's EVP, which means that we won't get AES-NI (see bug 3002) and similar things. We might lose more than we gain.

 - Modern OpenSSH prefers ChaCha20 over AES.

 - The server might want other ciphers or chaining methods, even though it is not OpenSSH's default.
Comment 1 Pierre Ossman cendio 2015-08-25 15:18:50 CEST
If we want to use OpenMP, then bug 5615 needs to be fixed as well.
Comment 2 Pierre Ossman cendio 2021-09-23 15:27:05 CEST
This is vague and HPN-SSH themselves admin that AES SNI is faster than their version.

ssh isn't even close to being a performance bottleneck at the moment, so investigation bugs like these aren't productive.

Note You need to log in before you can comment on or make changes to this bug.