applied

On Wed, May 31, 2017 at 09:38:00AM +0200, Fabian Grünbichler wrote:
> blowfish, 3des and arcfour are not enabled by default on the
> server side anyway.
> 
> on most hardware, AES is about 3 times faster than Chacha20
> because of hardware accelerated AES, hence the changed order
> of preference compared to the default.
> 
> Signed-off-by: Fabian Grünbichler <f.gruenbich...@proxmox.com>
> ---
> Alternatively, we could drop this altogether and leave it up to the admin to
> prefer AES if the hardware supports it? Chacha20 manages about 300MB/s in a VM
> here, which is enough to saturate a GBit link..
> 
>  data/PVE/Cluster.pm | 5 +++--
>  1 file changed, 3 insertions(+), 2 deletions(-)
> 
> diff --git a/data/PVE/Cluster.pm b/data/PVE/Cluster.pm
> index 731acc5..4915cb3 100644
> --- a/data/PVE/Cluster.pm
> +++ b/data/PVE/Cluster.pm
> @@ -1132,8 +1132,9 @@ sub setup_rootsshconfig {
>      if (! -f $rootsshconfig) {
>          mkdir '/root/.ssh';
>          if (my $fh = IO::File->new($rootsshconfig, O_CREAT|O_WRONLY|O_EXCL, 
> 0640)) {
> -            # this is the default ciphers list from debian openssl0.9.8 
> except blowfish is added as prefered
> -            print $fh "Ciphers 
> blowfish-cbc,aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc\n";
> +            # this is the default ciphers list from Debian's OpenSSH package 
> (OpenSSH_7.4p1 Debian-10, OpenSSL 1.0.2k  26 Jan 2017)
> +         # changed order to put AES before Chacha20 (most hardware has AESNI)
> +            print $fh "Ciphers 
> aes128-ctr,aes192-ctr,aes256-ctr,aes128-...@openssh.com,aes256-...@openssh.com,chacha20-poly1...@openssh.com\n";
>              close($fh);
>          }
>      }
> -- 
> 2.1.4

_______________________________________________
pve-devel mailing list
pve-devel@pve.proxmox.com
https://pve.proxmox.com/cgi-bin/mailman/listinfo/pve-devel

Reply via email to