Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 10 Nov 2015 17:41:02 -0800
From:      John-Mark Gurney <jmg@funkthat.com>
To:        Bryan Drewery <bdrewery@FreeBSD.org>
Cc:        Dag-Erling =?iso-8859-1?Q?Sm=F8rgrav?= <des@des.no>, freebsd-current@FreeBSD.org, freebsd-security@FreeBSD.org
Subject:   Re: OpenSSH HPN
Message-ID:  <20151111014102.GQ65715@funkthat.com>
In-Reply-To: <56428C84.8050600@FreeBSD.org>
References:  <86io5a9ome.fsf@desk.des.no> <20151110175216.GN65715@funkthat.com> <56428C84.8050600@FreeBSD.org>

next in thread | previous in thread | raw e-mail | index | archive | help
Bryan Drewery wrote this message on Tue, Nov 10, 2015 at 16:32 -0800:
> On 11/10/15 9:52 AM, John-Mark Gurney wrote:
> > My vote is to remove the HPN patches.  First, the NONE cipher made more
> > sense back when we didn't have AES-NI widely available, and you were
> > seriously limited by it's performance.  Now we have both aes-gcm and
> > chacha-poly which it's performance should be more than acceptable for
> > today's uses (i.e. cipher performance is 2GB/sec+).
> 
> AES-NI doesn't help the absurdity of double-encrypting when using scp or
> rsync/ssh over an encrypted VPN, which is where NONE makes sense to use
> for me.

Different layers of protection...

Do you disable all encryption when you're transiting trusted networks
like your VPN?  If you don't, why is that ssh session so special?

-- 
  John-Mark Gurney				Voice: +1 415 225 5579

     "All that I will do, has been done, All that I have, has not."



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20151111014102.GQ65715>