2016-02-15 14:57 GMT+01:00 jean-frederic clere <jfcl...@gmail.com>:

> Using a cipher that allow HTTP/2 to work with the standard browsers
> (like firefox and chrome) make sense otherwise we would be benching an
> old "unsafe" cipher.
>
> I can't rerun my apache con tests right now but that time
> AES128-GCM-SHA256 was the cipher I used.
>
> I had done some extensive (?) benchmarking 6 months ago (more or less),
and things are quite different now, cool :)

Looking at the cipher list from my OpenSSL (Fedora 23 OpenSSL), there are
only 8 ciphers left for the cipher suite that Tomcat uses [and TLS 1.2 and
a RSA certificate]. Half with DHE, half with ECDHE. ab refuses to connect
to JSSE with ECDHE and AES 256. With AES 128, a recent JDK 8 worked, but
not OpenJDK 8 from Fedora [which is unusable at the moment since browsers
refuse to connect as well].

So here's the result array (in k reqs/s):
___________________________________________            OpenSSL
JSSE        APR
ECDHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH            63        NA
67
ECDHE-RSA-AES256-SHA384 TLSv1.2 Kx=ECDH____             37        NA
37
DHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=DH____                22        30
    22
DHE-RSA-AES256-SHA256   TLSv1.2 Kx=DH______               20        28
    20
ECDHE-RSA-AES128-GCM-SHA256 TLSv1.2 Kx=ECDH             65        30
70
ECDHE-RSA-AES128-SHA256 TLSv1.2 Kx=ECDH____                45        29
    45
DHE-RSA-AES128-GCM-SHA256 TLSv1.2 Kx=DH____              22        29
    23
DHE-RSA-AES128-SHA256   TLSv1.2 Kx=DH______             20        28
20

So OpenSSL is much faster for me for ECDHE, but not with DHE. Browsers use
ECDHE.

Rémy

Reply via email to