Interesting... I have a base T620 and I tested itsi 65W PS on the Plus model and no go. Blinking Red on power switch LED & some beep pattern.
Yeah, I can confirm on the working T620 90W PSU, I measured 20V from the outer ring to the inner ring and I measured 15.4V from the outer ring to the center pin.EDIT: nevermind, just confirmed BOTH power supplies do indeed have 3 contacts, one of them being a sense pin - the 14v I was measuring was between the outer metal and the center pin which was 14v- so the center pin seems to be a sense pin. If you measure from the outer metal ring (ground) to the inner metal (being careful not to touch the center pin) it measures the expected 19V - making the inner metal the positive contact.
I would imagine the voltage between ground (outer metal) and the center sense pin is different between the two power bricks and that's how the t620 knows what's plugged in
I'm not sure that person's article actually shows it working at a technical level. It sounded more like a spec sheet review?Can anyone running pfsense on one of these verify if it satisfies the "AES-NI" requirement? (I know it's not a strict requirement NOW, but I'm curious - esp for openvpn acceleration) I know the spec sheet for the amd proc in these things mention crypto accel, but it's not intel's specific AES-NI obviously
EDIT: nevermind, this confirms it does! makes this box even more of a gem The HP T620 Plus Thin Client: A hidden gem in the world of pfSense hardware
I'm still on T610+ and haven't yet switched over to T620+. It does support AES-NI. That was the whole reason I got this in the first place. I can hook it up tomorrow and confirm.EDIT: nevermind, this confirms it does! makes this box even more of a gem The HP T620 Plus Thin Client: A hidden gem in the world of pfSense hardware
I'm not great at these things. Mine arrived. How do I open it?
# export OPENSSL_ia32cap="~0x200000200000000"
# openssl speed -elapsed -evp aes-256-ecb
You have chosen to measure elapsed time instead of user CPU time.
Doing aes-256-ecb for 3s on 16 size blocks: 9424929 aes-256-ecb's in 3.00s
Doing aes-256-ecb for 3s on 64 size blocks: 2459627 aes-256-ecb's in 3.00s
Doing aes-256-ecb for 3s on 256 size blocks: 626959 aes-256-ecb's in 3.00s
Doing aes-256-ecb for 3s on 1024 size blocks: 157503 aes-256-ecb's in 3.00s
Doing aes-256-ecb for 3s on 8192 size blocks: 19714 aes-256-ecb's in 3.00s
OpenSSL 1.0.2k-fips 26 Jan 2017
built on: reproducible build, date unspecified
options:bn(64,64) md2(int) rc4(8x,int) des(idx,cisc,16,int) aes(partial) idea(int) blowfish(idx)
compiler: gcc -I. -I.. -I../include -fPIC -DOPENSSL_PIC -DZLIB -DOPENSSL_THREADS -D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -DKRB5_MIT -m64 -DL_ENDIAN -Wall -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mtune=generic -Wa,--noexecstack -DPURIFY -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DRC4_ASM -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DMD5_ASM -DAES_ASM -DVPAES_ASM -DBSAES_ASM -DWHIRLPOOL_ASM -DGHASH_ASM -DECP_NISTZ256_ASM
The 'numbers' are in 1000s of bytes per second processed.
type 16 bytes 64 bytes 256 bytes 1024 bytes 8192 bytes
aes-256-ecb 50266.29k 52472.04k 53500.50k 53761.02k 53832.36k
# unset OPENSSL_ia32cap
# openssl speed -elapsed -evp aes-256-ecb
You have chosen to measure elapsed time instead of user CPU time.
Doing aes-256-ecb for 3s on 16 size blocks: 52718022 aes-256-ecb's in 3.00s
Doing aes-256-ecb for 3s on 64 size blocks: 46909311 aes-256-ecb's in 3.00s
Doing aes-256-ecb for 3s on 256 size blocks: 17730992 aes-256-ecb's in 3.00s
Doing aes-256-ecb for 3s on 1024 size blocks: 4871118 aes-256-ecb's in 3.00s
Doing aes-256-ecb for 3s on 8192 size blocks: 636955 aes-256-ecb's in 3.00s
OpenSSL 1.0.2k-fips 26 Jan 2017
built on: reproducible build, date unspecified
options:bn(64,64) md2(int) rc4(8x,int) des(idx,cisc,16,int) aes(partial) idea(int) blowfish(idx)
compiler: gcc -I. -I.. -I../include -fPIC -DOPENSSL_PIC -DZLIB -DOPENSSL_THREADS -D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -DKRB5_MIT -m64 -DL_ENDIAN -Wall -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mtune=generic -Wa,--noexecstack -DPURIFY -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DRC4_ASM -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DMD5_ASM -DAES_ASM -DVPAES_ASM -DBSAES_ASM -DWHIRLPOOL_ASM -DGHASH_ASM -DECP_NISTZ256_ASM
The 'numbers' are in 1000s of bytes per second processed.
type 16 bytes 64 bytes 256 bytes 1024 bytes 8192 bytes
aes-256-ecb 281162.78k 1000731.97k 1513044.65k 1662674.94k 1739311.79k
Ok, so if I follow that methodology:Is my understanding of the numbers right?
it's about 281M Bytes/s *8 ~ 2.24gbps?
IIRC, my pfSense metrics were lot lower.
If you have OpenVPN package installed on your Linux, can you measure test-crypto performance? These was even lower than openssl speed.
OpenVPN - estimate performance via OpenVPN
# time openvpn --test-crypto --secret /tmp/secret --verb 0 --tun-mtu 20000 --cipher aes-256-cbc
Wed Jul 25 10:55:51 2018 disabling NCP mode (--ncp-disable) because not in P2MP client or server mode
real 0m14.717s
user 0m14.682s
sys 0m0.025s
# echo "3200 / 14.717" | bc
217
# export OPENSSL_ia32cap="~0x200000200000000"
# time openvpn --test-crypto --secret /tmp/secret --verb 0 --tun-mtu 20000 --cipher aes-256-cbc
Wed Jul 25 10:57:29 2018 disabling NCP mode (--ncp-disable) because not in P2MP client or server mode
real 0m19.614s
user 0m19.529s
sys 0m0.071s
# echo "3200 / 19.614" | bc
163
# unset OPENSSL_ia32cap
# time openvpn --test-crypto --secret /tmp/secret --verb 0 --tun-mtu 20000 --cipher aes-256-cbc
Wed Jul 25 10:58:18 2018 disabling NCP mode (--ncp-disable) because not in P2MP client or server mode
real 0m14.657s
user 0m14.573s
sys 0m0.074s
# echo "3200 / 14.657" | bc
218
I'm not sure how your remark ties into the conversation here.... OpenVPN being single threaded, it seems aes-ni only makes a 33% improvement using the testing methodology @nthu9280 pointed to.OpenVPN is single threaded...you're measuring the performance with a single core.
i3-3220:
type 16 bytes 64 bytes 256 bytes 1024 bytes 8192 bytes
aes-256-ecb 199626.74k 235043.58k 242270.12k 245337.07k 245620.82k
AMD GX-420CA:
type 16 bytes 64 bytes 256 bytes 1024 bytes 8192 bytes
aes-256-ecb 281162.78k 1000731.97k 1513044.65k 1662674.94k 1739311.79k
AMD GX-420CA:
type 16 bytes 64 bytes 256 bytes 1024 bytes 8192 bytes
aes-256-ecb 50266.29k 52472.04k 53500.50k 53761.02k 53832.36k
i3-3220
type 16 bytes 64 bytes 256 bytes 1024 bytes 8192 bytes
aes-256-ecb 199626.74k 235043.58k 242270.12k 245337.07k 245620.82k