Bug 5617 - multi-threaded AES CTR in OpenSSH
Summary: multi-threaded AES CTR in OpenSSH
Status: NEW
Alias: None
Product: ThinLinc
Classification: Unclassified
Component: Client (show other bugs)
Version: pre-1.0
Hardware: PC Unknown
: P2 Normal
Target Milestone: MediumPrio
Assignee: Pierre Ossman
URL:
Keywords:
Depends on: 5615
Blocks: 1584
  Show dependency treegraph
 
Reported: 2015-08-25 15:04 CEST by Pierre Ossman
Modified: 2015-09-01 10:33 CEST (History)
1 user (show)

See Also:
Acceptance Criteria:


Attachments

Description Pierre Ossman cendio 2015-08-25 15:04:05 CEST
Split from bug 1584.

We need to investigate if we can boost performance of OpenSSH on multi-core systems by multi-threading the AES CTR handling. One implementation of that is done here:

http://www.psc.edu/networking/projects/hpn-ssh/

There are some hurdles though:

 - It bypasses OpenSSL's EVP, which means that we won't get AES-NI (see bug 3002) and similar things. We might lose more than we gain.

 - Modern OpenSSH prefers ChaCha20 over AES.

 - The server might want other ciphers or chaining methods, even though it is not OpenSSH's default.
Comment 1 Pierre Ossman cendio 2015-08-25 15:18:50 CEST
If we want to use OpenMP, then bug 5615 needs to be fixed as well.

Note You need to log in before you can comment on or make changes to this bug.