Optional 'test' or benchmark cipher

Linda Walsh open-ssh at tlinx.org
Fri Jan 18 16:05:23 EST 2008


Chris Rapier wrote:
> Its a patch against OpenSSH with support for all of the recent releases. 
> It's primary goal is to open up the receive window limitation that 
> imposed by the multiplexing. If the BDP of your path is greater than 64k 
> in the case of 4.6 (or less) or around 1.25MB for 4.7 it can increase 
> your throughput assuming the network and end hosts are well tuned.
----
	BDP?  ...

> I'm not sure if you mentioned this or not but are you pegging your CPU? 
> As an aside, using a multicore machine won't help you much as SSH is 
> limited to using one core.
---
	One of the machines is pegged: an aging 2x1GHz PIII.  It's hard to
say what is happening where, since I'm working with 3 different machine types
(4 if you count 1 running WinXP vs. other running Linux).

[much stuff about network tuning deleted]
----
	The file transfer speed between via scp to a a cpu-limited
target (ish, below) is 10.4MB.  The same file transfered over CIFS,
a file-system protocol, runs at 28.7MB/s.  Network tuning isn't the
issue, though "end-to-end" latency caused by ssh may be.  Someone
asked why I wanted to put a null cipher into the default product:
One reason -- if I'm transferring a CD.iso or DVD(8.5G) image where
either is from one of my CD's or DVD's, I don't need the encryption
for the data.  I would still want the password encrypted as a matter
of policy.  I figure that "ssh" with a null cipher "has" to be better
than "SMB/CIFS" or NFS.

	The "oddest" result is pairing my two top-performer workstations
with each other (one running windows(ath), the other suse-64bit(asa).
Scp from the windows box -> the linux is ***horrible*** (and I'm not
pointing fingers at 'ssh', just thought it might be a fairly good
"tcp-stream" based xfer if it wasn't slowed down unnecessarily by the
slow encryptions.  Currently I have no "sshd" running on "ath" (Win),
so "copies" to or from are initiated from the windows box.  But
copying to "asa" uses less than 1% of the cpu on either box but
is limited to <1MB/s.  Turning the same connection around and initiating
a copy from the winbox (ath) from "asa" to the windows box yields the
"highest" ssh throughput (expected to be faster since both are faster
machines) at "16.7MB/s".  Max cpu use is 33% on "asa" (and less on the
Win-box, "ath") -- so neither of those ops are cpu limited.

	I'm NOT wanting you to figure out what is going on there -- its
obviously some hardware/software mismatch and ssh could only be a
minuscule contributor -- though the 16.7MB/s worries me a bit in that
neither machine is cpu-bound.  But 'note', using one of the cpu bound
machines (ish), got 10.4MB upstream and 12.5 downstream with ssh, though
SMB/CIFS speed from the same machine was 28.7MB/s -- likely near fastest
I'll get with that protocol due to latency.


> Start by doing baseline measurements of the network speed. If you 
> haven't looked at it yet Iperf is your best solution for that. Since it 
> doesn't rely on pipes, the filesystem, or anything like that its your 
> lightest weight option. Since it can also run in UDP mode it can even 
> give you information on any unexpected packet loss. Then rerun the tests 
> using a sample file to see how much of a bottleneck disk I/O is. At that 
> point you can determine how much of an impact the application is having.
---
	Haven't found a source for Iperf yet.  But I get nearly
2x performance over SSH with just using SMB.  I doubt disk is playing
much of a role (note, that the 250MB file I'm xfering fits in the
buffer cache of 3 out of 4 of the machines).

> And pretty much that's all been implemented in the HPN-SSH patch. You 
> can't embed the NoneEnabled directive in a Match block at this time. It 
> may or may not be possible but its a good idea and something I'll be 
> looking into over the next few weeks.
---
	Was preferring to have the standard ssh support it.  Obviously,
I have the sources and can hack something with-or-without a patch, but
I don't want to get into modifying or doing a "special compile" for yet
another piece of software (have done it with a few, and eventually I tend
to give up my 'special mods' over simplicity).

>>     That should spell it out very clearly enough to prevent
>> "accidents".  What security holes would I be missing?
> 
> If you enable NONE switching for interactive data you do actually open a 
> security hole. People *should* have the expectation that anything they 
> type into a secure shell should be, well, secure. I do not think that 
> necessarily applies to bulk data transfer though - with proper 
> safeguards in place.
----
	Well, one of the "requirements", in my proposal was to force
the user (interactive or not) to include a switch on the ssh/scp command
line, spelling out that encryption was turned off for the data.  If
the user expects security when choosing a --use-no-encryption option, well,
Unix has traditionally allowed people to shoot themselves in the foot if
they really want to enough. :-)  Additionally, I don't want the
non-encryption turned on by default (which I might get if the options
were in the config files).

> 
> But really, I'm not entirely sure what you want.
---
	I want to be able to turn off encryption on the 'normal' openssh
product, under specific circumstances, including benchmarking to see
what openssh's "end-to-end" latency is, but also for xfering large
files over an internal network.  While CIFS works well one one of the
computers is Windows, It _seems_ to have lower performance between
linux machines.

> If you *just* want to 
> benchmark things with and without encryption its not that hard to hack 
> the none cipher back into the cipher lists. If you want a more general 
> solution that can be used in a production environment then you should 
> probably just use the HPN-SSH patch.
---

What is "HPN"...I don't recognize it as a cipher.  As for "production"...
if I wanted this at a company, I'd tend to believe I was "insane".
"Deliberately disabling encryption at the server and client in a
production environment"?  Simply CYA politics should put someone off
doing that -- at least over any public network.  But the places where I'd
want to use it are on "internal networks", where I still wouldn't want
my password "open", but for running bulk transfers it can "likely" be
a good speed boost.  Nearly all of the "internal networks" I've
been on in the past 7-9 years or so have used some form of ssh --
usually (AFAIK) Openssh.

--------------------------
FWIW, the machines I was testing between:
                                                     Disk
Mach                                Speed   Mem     Speed   Ossh    Ossl
ID      "OS"            Processer   GHz     GB      MB/s    ver     ver
Ath  Cygwin/WinXP2      2xCore2-Duo  3.2     3      78.67   4.7p1   .9.8g
Ish  SuS93+262312       2 x PIII     1       1      55.56   3.9p1   .9.7g
Ast  SuS103+262312      Celeron     0.9     0.5     27.05   4.6p1   .9.8e
Asa  SuS103+262312-64   2xCore2-Duo  2       4      170.60  4.6p1   .9.8e

Heading notes:
OS  -   linux machines have same kern version: 2.6.23.12 (vanilla)
         Asa using 64bit version; others 32bit
Proc -  Hyperthreads OFF; ia32 or x86-64
Mem -   Usable mem by OS
DiskSpeeds - as measured by "hdparm --direct -t <dev>";
              used fastest of 5 runs




More information about the openssh-unix-dev mailing list