hi,
I would like to run a 100Mb/s tor exit node, but I have issues wrt power consumption.
reading http://ortizaudio.blogspot.fr/2011/10/using-dreamplugs-crypto-chip.html it seems dreamplugs has *fast* aes-128-ecb.
Does anyone have any experience running a node based on cheap crypto chip (dreamplug, marvell 88F6282, sheeva-core, padlock, ...) ? What performance can I expect out of these ?
regards, sv
Am Fri, 13 Sep 2013 00:25:47 +0200 schrieb Sarah Vigote pixelle@riseup.net:
I once meassured the performance of the padlock crypto chip on a VIA Esther C7 1500 MHz processor. Result: AES-128 cbc with padlock is about 14 times faster compared to the C7 with padlock disabled.
regards, Fabian
hi,
I would like to run a 100Mb/s tor exit node, but I have issues wrt power consumption.
reading http://ortizaudio.blogspot.fr/2011/10/using-dreamplugs-crypto-chip.html it seems dreamplugs has *fast* aes-128-ecb.
Does anyone have any experience running a node based on cheap crypto chip (dreamplug, marvell 88F6282, sheeva-core, padlock, ...) ? What performance can I expect out of these ?
regards, sv _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
On Fri, Sep 13, 2013 at 12:25:47AM +0200, Sarah Vigote wrote:
I would like to run a 100Mb/s tor exit node, but I have issues wrt power consumption.
reading http://ortizaudio.blogspot.fr/2011/10/using-dreamplugs-crypto-chip.html it seems dreamplugs has *fast* aes-128-ecb.
Does anyone have any experience running a node based on cheap crypto chip (dreamplug, marvell 88F6282, sheeva-core, padlock, ...) ? What performance can I expect out of these ?
Unfortunately AES is not the primary CPU consumer on Tor nodes right now; we spend a lot more time doing bignum computation for TAP circuits. Crypto accelerators don't work very well for bignums.
It's not a perfect equivalence, but "openssl speed rsa" should give a reasonable estimate of how well your chip will do for TAP circuit creation. Here's a dual-core Westmere at 2.1 GHz (should be fairly close to a modern Xeon core):
sign verify sign/s verify/s rsa 512 bits 0.000105s 0.000007s 9548.7 137778.7 rsa 1024 bits 0.000340s 0.000021s 2941.1 48539.0 rsa 2048 bits 0.002205s 0.000070s 453.4 14362.8 rsa 4096 bits 0.016398s 0.000260s 61.0 3840.3
A single Xeon core can currently handle most of a 100 Mbps exit node's traffic, so you should look for a dual-core chip that delivers at least 1500 sign/s on rsa-1024. Unfortunately I doubt there are any ARM chips that can compete.
-andy
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
I'm not sure why I missed this first post but I'm very interested in working on this project with whomever is interested. I bought a pogoplug v2 specifically to test it's usefulness as a tor exit or relay. - -Jason
On 10/01/2013 06:39 PM, Andy Isaacson wrote:
On Fri, Sep 13, 2013 at 12:25:47AM +0200, Sarah Vigote wrote:
I would like to run a 100Mb/s tor exit node, but I have issues wrt power consumption.
reading http://ortizaudio.blogspot.fr/2011/10/using-dreamplugs-crypto-chip.html
it seems dreamplugs has *fast* aes-128-ecb.
Does anyone have any experience running a node based on cheap crypto chip (dreamplug, marvell 88F6282, sheeva-core, padlock, ...) ? What performance can I expect out of these ?
Unfortunately AES is not the primary CPU consumer on Tor nodes right now; we spend a lot more time doing bignum computation for TAP circuits. Crypto accelerators don't work very well for bignums.
It's not a perfect equivalence, but "openssl speed rsa" should give a reasonable estimate of how well your chip will do for TAP circuit creation. Here's a dual-core Westmere at 2.1 GHz (should be fairly close to a modern Xeon core):
sign verify sign/s verify/s rsa 512 bits 0.000105s 0.000007s 9548.7 137778.7 rsa 1024 bits 0.000340s 0.000021s 2941.1 48539.0 rsa 2048 bits 0.002205s 0.000070s 453.4 14362.8 rsa 4096 bits 0.016398s 0.000260s 61.0 3840.3
A single Xeon core can currently handle most of a 100 Mbps exit node's traffic, so you should look for a dual-core chip that delivers at least 1500 sign/s on rsa-1024. Unfortunately I doubt there are any ARM chips that can compete.
-andy _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
On Tue, Oct 01, 2013 at 06:45:52PM +0000, jason wrote:
I'm not sure why I missed this first post but I'm very interested in working on this project with whomever is interested. I bought a pogoplug v2 specifically to test it's usefulness as a tor exit or relay.
First step is, run "openssl speed rsa" and post the output to the list. While you're at it you may as well post the AES and SHA results as well. Heck, just run the whole "openssl speed" test (should take less than 20 minutes) and post the whole thing. :)
Also details on what CPU/RAM it has, and information about the kernel and OpenSSL package you are testing, would be useful. "dmesg" output and the contents of /proc/cpuinfo may be helpful.
-andy
On 2013-10-01 21:20, Andy Isaacson wrote:
On Tue, Oct 01, 2013 at 06:45:52PM +0000, jason wrote:
I'm not sure why I missed this first post but I'm very interested in working on this project with whomever is interested. I bought a pogoplug v2 specifically to test it's usefulness as a tor exit or relay.
First step is, run "openssl speed rsa" and post the output to the list. While you're at it you may as well post the AES and SHA results as well. Heck, just run the whole "openssl speed" test (should take less than 20 minutes) and post the whole thing. :)
Also details on what CPU/RAM it has, and information about the kernel and OpenSSL package you are testing, would be useful. "dmesg" output and the contents of /proc/cpuinfo may be helpful.
Maybe a good idea to put the output in the wiki somewhere?
Greets, Jeroen
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
I would love to do all this actually but I never managed to get the hw accelerated crypto (ssl/tls) bits working to experiment with. I'd be up for restarting this if I knew I could consult with one or two others who had a genuine interest in this. - -Jason
On 10/01/2013 08:26 PM, Jeroen Massar wrote:
On 2013-10-01 21:20, Andy Isaacson wrote:
On Tue, Oct 01, 2013 at 06:45:52PM +0000, jason wrote:
I'm not sure why I missed this first post but I'm very interested in working on this project with whomever is interested. I bought a pogoplug v2 specifically to test it's usefulness as a tor exit or relay.
First step is, run "openssl speed rsa" and post the output to the list. While you're at it you may as well post the AES and SHA results as well. Heck, just run the whole "openssl speed" test (should take less than 20 minutes) and post the whole thing. :)
Also details on what CPU/RAM it has, and information about the kernel and OpenSSL package you are testing, would be useful. "dmesg" output and the contents of /proc/cpuinfo may be helpful.
Maybe a good idea to put the output in the wiki somewhere?
Greets, Jeroen
_______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
I was looking into this for the BeagleBone black [1], which has on-chip accelerators for AES, SHA (1 I think), and md5. The TI processor also has a HWRNG. My belief was that by using the cryptodev kernel module [2] I could get this working, but I ran in some issues building the kernel and then I was caught up in other things.
I'm not sure if my approach was flawed or what, but maybe it helps someone here.
Josh
[1] http://datko.net/2013/09/22/quest_bbb_crypto/ [2] http://cryptodev-linux.org/
On Tue, Oct 1, 2013 at 2:35 PM, jason jason@piratar.is wrote:
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
I would love to do all this actually but I never managed to get the hw accelerated crypto (ssl/tls) bits working to experiment with. I'd be up for restarting this if I knew I could consult with one or two others who had a genuine interest in this.
- -Jason
On 10/01/2013 08:26 PM, Jeroen Massar wrote:
On 2013-10-01 21:20, Andy Isaacson wrote:
On Tue, Oct 01, 2013 at 06:45:52PM +0000, jason wrote:
I'm not sure why I missed this first post but I'm very interested in working on this project with whomever is interested. I bought a pogoplug v2 specifically to test it's usefulness as a tor exit or relay.
First step is, run "openssl speed rsa" and post the output to the list. While you're at it you may as well post the AES and SHA results as well. Heck, just run the whole "openssl speed" test (should take less than 20 minutes) and post the whole thing. :)
Also details on what CPU/RAM it has, and information about the kernel and OpenSSL package you are testing, would be useful. "dmesg" output and the contents of /proc/cpuinfo may be helpful.
Maybe a good idea to put the output in the wiki somewhere?
Greets, Jeroen
_______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
iQIcBAEBAgAGBQJSSzIUAAoJEOXtwcWdKrpuw1oP/RW+ZvMVTDAL0PrKniMB+skZ gZf/G2grWaGHzOyo3rC0er8iZdfFY1lN6SB/NWUR7K1xAIvnARRv5Y/N62f9T5O4 a3bOu61T0XtZ3CeGVtA9Op9QmCOC/UOMebVh4Fa1/Ksb7eEpcne7JcCpW4wnGLHO iL+nHDEhyfCjYtBQHa471RaIha+D25yKMIaEhjol9daEbW3PdryzHH7F7mVOYwiT W+cCeu5NnHRp9FIwOXTPWwaTLro4XsORLcuJzXjF2Gz6k/HXF1yi1eBv9ljvsa5y /ZrpzYqk6gE6zr51GolIypIMm4bLnuzs5ld4XsXT2rdJUSgBKpzydqdn0UZplVKa 4Tes7s/8WQCK0CGQvguhQYxUTzF9J/5PtWRBtb9UBM7Zzz1YLFEesQH4kGtevviO K8wInsAXcJjAYiPY51eoMXCz38qqHlhy9v/20cg8erJrC7K/r4OlmtDGBegrNI7G joHi+HsthFHcGs7AZb2dxSozO9+jt26gtG4u7XDdoEzF5hOJZBopjilERuNRUxSZ QHhUdPMh7UFOmYDNkrisF6qPImuuKtQf5NLQ0NaeOrXCwzgJTc4vMk9brAE2kZ0P lv389MO7d7AnvtMwr/fIjoZHTCgGuCQU0iA5baeid/FlfWsaHudkAI+7w77qRLCN dj7XKgeHH8XghTToTxaB =TTnt -----END PGP SIGNATURE----- _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
I'm interested if there are any hardware accelerators in either the Raspberry Pi (which needs all the help it can get) or the Cubieboard 2 (A20-based).
Best, - -Gordon M.
Joshua Datko:
I was looking into this for the BeagleBone black [1], which has on-chip accelerators for AES, SHA (1 I think), and md5. The TI processor also has a HWRNG. My belief was that by using the cryptodev kernel module [2] I could get this working, but I ran in some issues building the kernel and then I was caught up in other things.
I'm not sure if my approach was flawed or what, but maybe it helps someone here.
Josh
[1] http://datko.net/2013/09/22/quest_bbb_crypto/ [2] http://cryptodev-linux.org/
On Tue, Oct 1, 2013 at 2:35 PM, jason jason@piratar.is wrote: I would love to do all this actually but I never managed to get the hw accelerated crypto (ssl/tls) bits working to experiment with. I'd be up for restarting this if I knew I could consult with one or two others who had a genuine interest in this. -Jason
On 10/01/2013 08:26 PM, Jeroen Massar wrote:
On 2013-10-01 21:20, Andy Isaacson wrote:
On Tue, Oct 01, 2013 at 06:45:52PM +0000, jason wrote:
I'm not sure why I missed this first post but I'm very interested in working on this project with whomever is interested. I bought a pogoplug v2 specifically to test it's usefulness as a tor exit or relay.
First step is, run "openssl speed rsa" and post the output to the list. While you're at it you may as well post the AES and SHA results as well. Heck, just run the whole "openssl speed" test (should take less than 20 minutes) and post the whole thing. :)
Also details on what CPU/RAM it has, and information about the kernel and OpenSSL package you are testing, would be useful. "dmesg" output and the contents of /proc/cpuinfo may be helpful.
Maybe a good idea to put the output in the wiki somewhere?
Greets, Jeroen
_______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
_______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
_______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
- -- Sent from my thing that sends email.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
The pi doesn't have any as I'm aware of, I was looking into any and all small boards that posses the marvell kirkwood chipset which is supported by cryptodev module which openssl can be compiled to utilize. The cheapest one seems to be the v2 pogoplug, which can be had for as cheap as $20 USD off amazon.
here's some good info: http://www.altechnative.net/2011/05/22/hardware-accelerated-ssl-on-marvell-k...
Here's a brief overview of what I've tried to get working on my debian squeeze pogoplug. http://forum.doozan.com/read.php?2,9619
Here's a good listing of common plug boards and which processors they contain, including the pi: http://archlinuxarm.org/platforms
Perhaps if enough are interested we could form a small group to work on this again. mail me directly if interested.
The output from the pogo 'openssl speed rsa' is as follows (keep in mind this is WITHOUT cryptodev support enabled). If someone points me to the appropriate place on the wiki I'll be happy to fill in the required info.
Doing 512 bit private rsa's for 10s: 3906 512 bit private RSA's in 9.86s Doing 512 bit public rsa's for 10s: 43400 512 bit public RSA's in 9.84s Doing 1024 bit private rsa's for 10s: 786 1024 bit private RSA's in 9.87s Doing 1024 bit public rsa's for 10s: 15983 1024 bit public RSA's in 9.86s Doing 2048 bit private rsa's for 10s: 136 2048 bit private RSA's in 9.93s Doing 2048 bit public rsa's for 10s: 5032 2048 bit public RSA's in 9.86s Doing 4096 bit private rsa's for 10s: 22 4096 bit private RSA's in 10.32s Doing 4096 bit public rsa's for 10s: 1479 4096 bit public RSA's in 9.85s OpenSSL 1.0.1c 10 May 2012 built on: Sun Jul 29 13:43:04 UTC 2012 options:bn(64,32) rc4(ptr,char) des(idx,cisc,16,long) aes(partial) blowfish(ptr) compiler: gcc -fPIC -DOPENSSL_PIC -DZLIB -DOPENSSL_THREADS - -D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -DL_ENDIAN -DTERMIO -g -O2 - -fstack-protector --param=ssp-buffer-size=4 -Wformat - -Werror=format-security -D_FORTIFY_SOURCE=2 -Wl,-z,relro - -Wa,--noexecstack -Wall sign verify sign/s verify/s rsa 512 bits 0.002524s 0.000227s 396.1 4410.6 rsa 1024 bits 0.012557s 0.000617s 79.6 1621.0 rsa 2048 bits 0.073015s 0.001959s 13.7 510.3 rsa 4096 bits 0.469091s 0.006660s 2.1 150.2
- -J
On 10/02/2013 02:02 AM, Gordon Morehouse wrote:
I'm interested if there are any hardware accelerators in either the Raspberry Pi (which needs all the help it can get) or the Cubieboard 2 (A20-based).
Best, -Gordon M.
Joshua Datko:
I was looking into this for the BeagleBone black [1], which has on-chip accelerators for AES, SHA (1 I think), and md5. The TI processor also has a HWRNG. My belief was that by using the cryptodev kernel module [2] I could get this working, but I ran in some issues building the kernel and then I was caught up in other things.
I'm not sure if my approach was flawed or what, but maybe it helps someone here.
Josh
[1] http://datko.net/2013/09/22/quest_bbb_crypto/ [2] http://cryptodev-linux.org/
On Tue, Oct 1, 2013 at 2:35 PM, jason jason@piratar.is wrote: I would love to do all this actually but I never managed to get the hw accelerated crypto (ssl/tls) bits working to experiment with. I'd be up for restarting this if I knew I could consult with one or two others who had a genuine interest in this. -Jason
On 10/01/2013 08:26 PM, Jeroen Massar wrote:
On 2013-10-01 21:20, Andy Isaacson wrote:
On Tue, Oct 01, 2013 at 06:45:52PM +0000, jason wrote: > I'm not sure why I missed this first post but I'm very > interested in working on this project with whomever is > interested. I bought a pogoplug v2 specifically to > test it's usefulness as a tor exit or relay.
First step is, run "openssl speed rsa" and post the output to the list. While you're at it you may as well post the AES and SHA results as well. Heck, just run the whole "openssl speed" test (should take less than 20 minutes) and post the whole thing. :)
Also details on what CPU/RAM it has, and information about the kernel and OpenSSL package you are testing, would be useful. "dmesg" output and the contents of /proc/cpuinfo may be helpful.
Maybe a good idea to put the output in the wiki somewhere?
Greets, Jeroen
_______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
_______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
_______________________________________________ tor-relays mailing
list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
_______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
On 10/01/2013 10:02 PM, Gordon Morehouse wrote:
I'm interested if there are any hardware accelerators in either the Raspberry Pi (which needs all the help it can get) or the Cubieboard 2 (A20-based).
To the best of my knowledge, no.
http://www.raspberrypi.org/phpBB3/viewtopic.php?f=7&t=2723
http://www.raspberrypi.org/phpBB3/viewtopic.php?f=2&t=659
The RasPi is nice but it's also not terribly powerful. It definitely has its limits. For example, I found out the hard way last weekend that trying to run an Etherpad-Lite on a RasPi is a great way to run one into the ground...
- -- The Doctor [412/724/301/703] [ZS] Developer, Project Byzantium: http://project-byzantium.org/
PGP: 0x807B17C1 / 7960 1CDC 85C9 0B63 8D9F DD89 3BD8 FF2B 807B 17C1 WWW: https://drwho.virtadpt.net/
Meeble! Meeble meeble meeble!
The RasPi is nice but it's also not terribly powerful. It definitely has its limits. For example, I found out the hard way last weekend that trying to run an Etherpad-Lite on a RasPi is a great way to run one into the ground...
I have a RasPi Model B Rev 2 running etherpad-lite and a Tor-Relay. Slow as shit, but it works. :-)
Happily, it DOES appear that there may be some hope for the Allwinner A20 based Cubieboard 2 (I haven't checked for the original Cubieboard yet):
"The Security System (SS) is one encrypt/ decrypt function accelerator that is suitable for a variety of applications. It supports both encryption and decryption. Several modes are supported by the SS module.
It features:
AES, DES, 3DES, SHA-1, MD5 are supported by this system ECB, CBC, CNT modes for AES/DES/3DES 128-bit, 192-bit and 256-bit key size for AES 160-bit hardware PRNG with 192-bit seed 32-word RX FIFO and 32-word TX FIFO for high speed application Support CPU mode and DMA mode Interrupt support"
http://dl.linux-sunxi.org/A20/A20%20User%20Manual%202013-03-22.pdf
So, it may be a little help, anyway.
The Cubieboard 2 is great for small Tor relays - it'd definitely be more capable than a Raspberry Pi model B as it has double the RAM and 2 more powerful cores with ARMv7 instead of ARMv6.
It's also almost double the price (for considerably more than double the computer), but I don't expect that to last long.
Best, -Gordon M.
On Tue, 01 Oct 2013 19:02:37 -0700, Gordon Morehouse gordon@morehouse.me wrote:
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
I'm interested if there are any hardware accelerators in either the Raspberry Pi (which needs all the help it can get) or the Cubieboard 2 (A20-based).
Best,
- -Gordon M.
Joshua Datko:
I was looking into this for the BeagleBone black [1], which has on-chip accelerators for AES, SHA (1 I think), and md5. The TI processor also has a HWRNG. My belief was that by using the cryptodev kernel module [2] I could get this working, but I ran in some issues building the kernel and then I was caught up in other things.
I'm not sure if my approach was flawed or what, but maybe it helps someone here.
Josh
[1] http://datko.net/2013/09/22/quest_bbb_crypto/ [2] http://cryptodev-linux.org/
On Tue, Oct 1, 2013 at 2:35 PM, jason jason@piratar.is wrote: I would love to do all this actually but I never managed to get the hw accelerated crypto (ssl/tls) bits working to experiment with. I'd be up for restarting this if I knew I could consult with one or two others who had a genuine interest in this. -Jason
On 10/01/2013 08:26 PM, Jeroen Massar wrote:
On 2013-10-01 21:20, Andy Isaacson wrote:
On Tue, Oct 01, 2013 at 06:45:52PM +0000, jason wrote: > I'm not sure why I missed this first post but I'm very > interested in working on this project with whomever is > interested. I bought a pogoplug v2 specifically to test > it's usefulness as a tor exit or relay.
First step is, run "openssl speed rsa" and post the output to the list. While you're at it you may as well post the AES and SHA results as well. Heck, just run the whole "openssl speed" test (should take less than 20 minutes) and post the whole thing. :)
Also details on what CPU/RAM it has, and information about the kernel and OpenSSL package you are testing, would be useful. "dmesg" output and the contents of /proc/cpuinfo may be helpful.
Maybe a good idea to put the output in the wiki somewhere?
Greets, Jeroen
_______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
_______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
_______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Sent from my thing that sends email. -----BEGIN PGP SIGNATURE-----
iQEcBAEBCgAGBQJSS366AAoJED/jpRoe7/ujyREIAKb2xTXWR8xLdVpj2K8Dub9W jSuMtWycMgSW5nkJAOCwA+uJuX47/v7tzejNut1E76oRaAHwEn1fufiWGdT+Dbju f4BycdI5Pl3NTRuYcFBas32+lbFeyw+gLClczUjfE+fe/pmHiaXAXra6Alai40z8 77B/xGQwrpVyla4S8JHP4CY/p6FHuI5JDs+ghvVESUEK2DHJdNt5R2oLSBy4ZNQw BTzAf6qvflFUWhpWOkIkzIzo0c5FsJ/nYiVWpWyAjdV1NgufPdZ8ZKIoNx92iJBP aD1G7h9fQh3E2AU/6VHPvPdekQ5NPzehXtH8ywNFMw16oFbXkZ6/eUYUpJ50YZ8= =3Yig -----END PGP SIGNATURE----- _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tor-relays@lists.torproject.org