Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 15 Apr 2004 11:05:30 -0400
From:      Mike Tancsa <mike@sentex.net>
To:        andy@lewman.com
Cc:        freebsd-security@freebsd.org
Subject:   Re: recommended SSL-friendly crypto accelerator
Message-ID:  <6.0.3.0.0.20040415105459.0477f488@209.112.4.2>
In-Reply-To: <20040415145148.GA99338@phobos.osem.com>
References:  <20040408144322.GA83448@bewilderbeast.blackhelicopters.org> <26486.1081437513@critter.freebsd.dk> <20040413181943.GA55219@bewilderbeast.blackhelicopters.org> <20040415030319.GA71038@phobos.osem.com> <6.0.3.0.0.20040414230754.07d7cf18@209.112.4.2> <20040415145148.GA99338@phobos.osem.com>

next in thread | previous in thread | raw e-mail | index | archive | help
At 10:51 AM 15/04/2004, andy@lewman.com wrote:
>hifnstats shows decent amounts of traffic through it (at least
>interrupts) however cryptokeytest doesn't work due to an unsupport call
>apparently.
>
>Here's my hifnstats:
>
>input 476104224 bytes 1527365 packets
>output 476104224 bytes 1527365 packets

But is that your ssh session that is being accelerated ?  To test, login 
via the console, or login using blowfish as the cipher.  Then run hifnstats 
and make sure that the packet counters are not incrementing.  Then do your 
https test.

         ---Mike 



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?6.0.3.0.0.20040415105459.0477f488>