Cipher preference

James Cloos cloos at jhcloos.com
Tue Dec 31 12:49:15 EST 2013


When testing chacha20-poly1305, I noticed that aes-gcm is significantly
faster than aes-ctr or aes-cbs with umac.  Even on systems w/o aes-ni
or other recent instruction set additions.

And there seems to be consensus in the crypto community that AEAD
ciphers are the way forward.

As such, it promoting the AEAD ciphers to the head of the preference
list looks like a good idea.

That would mean either:

#define KEX_DEFAULT_ENCRYPT \
        AESGCM_CIPHER_MODES \
        "chacha20-poly1305 at openssh.com," \
        "aes128-ctr,aes192-ctr,aes256-ctr," \
        "arcfour256,arcfour128," \
        "aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc," \
        "aes192-cbc,aes256-cbc,arcfour,rijndael-cbc at lysator.liu.se"

or:

#define KEX_DEFAULT_ENCRYPT \
        "chacha20-poly1305 at openssh.com," \
        AESGCM_CIPHER_MODES \
        "aes128-ctr,aes192-ctr,aes256-ctr," \
        "arcfour256,arcfour128," \
        "aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc," \
        "aes192-cbc,aes256-cbc,arcfour,rijndael-cbc at lysator.liu.se"

The fact that AESGCM_CIPHER_MODES expands to "" when compiled against
versions of openssl which lack EVPGCM may put a damper in that, but
perhaps it still seems better to use whichever AEADs are available
whenever they are available.

-JimC
--
James Cloos <cloos at jhcloos.com>         OpenPGP: 1024D/ED7DAEA6


More information about the openssh-unix-dev mailing list