Bug 5463 - libgmp very slow on solaris
Summary: libgmp very slow on solaris
Status: CLOSED FIXED
Alias: None
Product: ThinLinc
Classification: Unclassified
Component: Build system (show other bugs)
Version: pre-1.0
Hardware: PC Unknown
: P2 Normal
Target Milestone: 4.4.0
Assignee: Pierre Ossman
URL:
Keywords: prosaic, samuel_tester
Depends on:
Blocks:
 
Reported: 2015-03-06 13:17 CET by Pierre Ossman
Modified: 2015-04-10 13:45 CEST (History)
2 users (show)

See Also:
Acceptance Criteria:


Attachments

Description Pierre Ossman cendio 2015-03-06 13:17:46 CET
while playing around with bug 5044 we discovered that libgmp is the culprit behind why tlstunnel is so slow on Solaris. We also found that opencsw's libgmp did not have this performance problem.

Digging further we found that libgmp has some hand-optimised code depending on which CPU you have. Unfortunately the configure script is not clever enough to figure out the correct thing with Solaris' triplets. If we help it out and tell it the minimum CPU it can assume then the performance skyrockets. Operations that currently take 600 ms take about 50 ms with a more properly built libgmp.
Comment 1 Pierre Ossman cendio 2015-03-06 13:36:08 CET
Fixed in r30109.

Tester should try out tlwebaccess and tlwebadm and check that request are handled within a hundred ms or so.
Comment 2 Pierre Ossman cendio 2015-03-09 10:25:48 CET
This change also means that diffie-hellman is now acceptably fast at safe key sizes. So let's turn that back on. This partly undoes bug 5460.
Comment 3 Pierre Ossman cendio 2015-03-09 10:27:01 CET
(In reply to comment #2)
> This change also means that diffie-hellman is now acceptably fast at safe key
> sizes. So let's turn that back on. This partly undoes bug 5460.

r30116.
Comment 4 Samuel Mannehed cendio 2015-04-10 13:45:19 CEST
(In reply to comment #1)
> Fixed in r30109.
> 
> Tester should try out tlwebaccess and tlwebadm and check that request are
> handled within a hundred ms or so.

Using the following in tlwebadm.hconf and tlwebaccess.hconf results in Chrome using DHE-RSA:

gnutls_priority=NORMAL:-ECDHE-RSA

In chrome I looked at the network tab in the developer tools. Information regarding request times are available in that tab. According to that, the time the SSL part of the different requests take range from 70ms to 900ms. The mean time amounted to roughyly 150 ms though. Good enough

Note You need to log in before you can comment on or make changes to this bug.