@alterelefant @HauntedOwlbear nodds in agreement

I rarely see any setup that maxes out the 2 GBit/s per CPU core with #AESni and optimized #IPsec parameters to for that, but if there ever is one that'll need more than what the average 1U 65W EPYC / Xeon can handle + a QAT card, then there's likely budget to get #tnsr #subscriptions waived through...

https://www.youtube.com/watch?v=nAY1SV74S88

What is TNSR?

YouTube

@critical @captainepoch some TP-Link should do that, tho if you're in the #EU you can,thank @EUCommission for killing #OpenWRT support with absurd #Firmware lockdowns.

Personally I'd recommend to #DIY something with #pfSense and seperate #WiFi and #Routing...

  • You may be able to snipe some cheap old Atom/Celeron machine that is #64bit, supports #AESni and has at least two NICs for under €50...

@marcan @lanodan the only cases where one would need even more Power are setups like High-Bandwith #VPN Gateways like some huge #pfSense if one needs 40+ GBit/s throughput on #OpenVPN or #WireGuard.

Mind you that #LUKS - aside from the encryption of the key in the header, uses #AES256 by default for a long time and is pretty efficient even prior to #AESni.

So no, in most cases the impact is purely synthetic and not really of any impact...

@marcan @lanodan depends.

#AESni will give you at least 2GByte/s per thread & core so unless you put a pair of PCIe 5.0 x4 NVMe|s on a board with only a CPU that has 4C/8T, you shoudln't be able to measure much of a performance loss.

Espechally since that worst-case doesn't even exist AFAIK nor would it make sense.

It would be a different story if #LUKS were to use something like #RSA or other public/private asymetric crypto for the actual data encryption.

Why on earth did #intel remove the constant time property of an cryptographic instruction? #aesni should protect against side channel attacks and as it’s primarily built for the cryptographic algorithm #aes it should respect the needs of #cryptography . Otherwise it could be possible to exfiltrate keys by measuring the execution time. I hope most cryptographic engineers are aware of this change in the latest microarchitectures.
https://www.phoronix.com/review/intel-doitm-linux
Linux Developers Evaluating New "DOITM" Security Mitigation For Latest Intel CPUs

@lcruggeri @DosFox pretty nifty SoC.

I built a custom #pfSense with that in 2017.

Sadly shortly after, #AESni became necessary for #pfSense 2.4 which sadly obsolieted it.

Needless to say if you just need a little #Linux #Box to "fuck around and find out" and tinker with as a "server" to learn on or use some lightweight distro like #BunsenLabs or #RaspberryPiOS that should be still usefill for most people.

Engineering and Powder Kegs | BSD Now 2

PeerTube