[tor-talk] Tor and AES-NI acceleration , and Tor profiling
Moritz Bartl
moritz at torservers.net
Mon Nov 7 01:57:39 UTC 2011
Hi,
Thanks to a new deal at www.axigy.com (Thanks! They're great!), we now
have a shiny dedicated Gbit/s exit with a Sandy Bridge CPU (Quad Xeon
E3-1230). Details on the setup steps I performed to enable AES-NI are
documented at
https://www.torservers.net/wiki/setup/server#aes-ni_crypto_acceleration
Decided to use Ubuntu because it comes with AES-NI kernel support and
patched OpenSSL. I had to enable AES-NI in the BIOS (disabled by default
on many motherboards) and load the module. Then put the relevant
switches in torrc to use it and restarted the processes.
[notice] Using OpenSSL engine Intel AES-NI engine [aesni] for AES
So my guess is that it is now being used, but I must say I would have
expected larger profit.
I am profiling that box as documented on
https://www.torservers.net/wiki/setup/profiling , so if you're
interested in more nasty details:
Every 10 minutes:
http://axigy1.torservers.net/vnstat.png
/usr/bin/vnstati -vs -o /var/www/vnstat.png -i eth1 >/dev/null 2>&1
(daily/monthly vnstat_d.png and vnstat_m.png)
Every hour:
http://axigy1.torservers.net/opreport.txt
/usr/bin/opreport -g -l /usr/sbin/tor
http://axigy1.torservers.net/opdump.txt
/usr/bin/opcontrol --dump && /usr/bin/opreport -l
http://axigy1.torservers.net/dstat.txt
dstat -tnl --tcp -N eth1 -cmdgirsy --fs -C total,0,1,2,3 3600
I hope this is useful to Tor devs.
--
Moritz Bartl
https://www.torservers.net/
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 455 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20111107/f5fd7eb8/attachment.pgp>
More information about the tor-talk
mailing list