Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Added documentation for SSL performance improvements #239

Merged
merged 1 commit into from Feb 15, 2017

Conversation

pveentjer
Copy link
Contributor

No description provided.

@@ -87,4 +87,23 @@ ClientConfig clientConfig = new ClientConfig();
clientConfig.getNetworkConfig().addAddress("127.0.0.1");
```

![image](images/NoteSmall.jpg) ***NOTE:*** *When you use SSL with the Java client, it will have a throughput that is 50% of a non-SSL Java client with the same configuration. If it is a .NET client, it will have a throughput that is 46% of a non-SSL .NET client.*
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I have removed this section since I don't know how valid these numbers are. Also with 3.8 a lot of things have changed + with the right changes there is some additional performance to gain on the JVM.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Okay.

@Serdaro Serdaro merged commit 922dd32 into master Feb 15, 2017
@pveentjer pveentjer deleted the ssl-performance-tips branch February 15, 2017 09:44
the generation of random numbers. /dev/random relies on entropy to be able to generate random numbers. However if this entropy is
insufficient to keep up with the rate requiring random numbers, it can slow down encryption/decryption. This can easily be fixed
by adding the following system property `-Djava.security.egd=file:/dev/./urandom`. For a more permanent solution modify
`<JAVA_HOME>/jre/lib/security/java.security` file; look for the `securerandom.source=/dev/urandom` and change it
Copy link
Contributor

@jerrinot jerrinot Feb 15, 2017

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this is a dangerous recommendation w/o informing about security implications.
the /dev/random device is used for a reason.

Copy link
Contributor Author

@pveentjer pveentjer Feb 15, 2017

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

ok. I assume you know what you are doing.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants