You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Nov 18, 2022. It is now read-only.
I note that the page now mentions AES128-SHA or AES256-SHA (though you actually tested AES128 in your benchmark here and found that to be fastest).
My general recommendation would be:
AES128 for most users
CHACHA20:RC4-MD5 if running an old CPU without AES acceleration. This may not work (CHACHA20 has low adoption and not available in OpenSSL 1.0.1, and RC4-MD5 is removed in OpenSSL 1.0.2 (?) or later), so if it doesn't, AES128+SHA (note the + instead of -) is probably the best bet
I don't know about GnuTLS, but OpenSSL is generally faster from experience (may no longer be true, I've done no testing with GnuTLS in the last few years). If my presumption holds true, performance conscious users may wish to use OpenSSL instead
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Settings page of web-interface suggests
RC4-MD5
as fastest cipher. This is not true for modern CPUs with hardware support for AES.The settings page should be updated to reflect that. The same applies to article Choosing Cipher.
The text was updated successfully, but these errors were encountered: