| Summary: | Add build-time option to use OpenSSL for ChaCha20-Poly1305 | ||
|---|---|---|---|
| Product: | Portable OpenSSH | Reporter: | Erik Jensen <businesscorrespondence+openssh> |
| Component: | Miscellaneous | Assignee: | Assigned to nobody <unassigned-bugs> |
| Status: | CLOSED FIXED | ||
| Severity: | enhancement | CC: | djm, fabio.pedretti, jjelen |
| Priority: | P5 | ||
| Version: | 7.9p1 | ||
| Hardware: | ARM | ||
| OS: | Linux | ||
|
Description
Erik Jensen
2019-02-24 08:59:27 AEDT
I don't think OpenSSL's combined chacha/poly method is compatible with OpenSSH's. It might be possible to use the individual primitives from libcrypto however. There was a patch sent to the mailing list a while ago for this, I'll see if I can dig it up The patches on mailing list are here: https://lists.mindrot.org/pipermail/openssh-unix-dev/2019-January/037457.html https://lists.mindrot.org/pipermail/openssh-unix-dev/2019-February/037547.html Testing and feedback would be welcomed. The author reports significant improvements in performance so I believe this is something worth investigating. See my followup at https://www.spinics.net/lists/openssh-unix-dev/msg05981.html This is done in 8.3: * ssh(1), sshd(8): prefer to use chacha20 from libcrypto where possible instead of the (slower) portable C implementation included in OpenSSH. However, AES ciphers are still a lot faster on AES acceletared hardware, see bug #3194. closing resolved bugs as of 8.6p1 release |