[prev in list] [next in list] [prev in thread] [next in thread]
List: gnutls-dev
Subject: Re: httpress benchmark utility now supports SSL via GNUTLS
From: Yaroslav <yarosla () gmail ! com>
Date: 2012-01-17 17:58:42
Message-ID: CACNYQ9H69xNO+aL3DqYKRcrprXPaXFXvLCgQoZfUJuOkDWu8_w () mail ! gmail ! com
[Download RAW message or body]
[Attachment #2 (multipart/alternative)]
The difference is huge. Here are some results.
Running tests against nxweb server, minimal c handler '<p>Hello,
world!</p>' (20 bytes).
Ubuntu 11.10 x64, 4 core CPU without AES-NI support.
Testing cipher suite:
ab info: TLSv1/SSLv3,ECDHE-RSA-AES256-SHA,2048,256
httpress info: ECDHE_RSA_AES_256_CBC_SHA1
- Key Exchange: ECDHE-RSA
- Ephemeral ECDH using curve SECP256R1
- Protocol: TLS1.0
- Certificate Type: X.509
- Compression: NULL
- Cipher: AES-256-CBC
- MAC: SHA1
Non-keep-alive:
ab -c 100 -n 6000
result: 380 rps
httpress -c100 -n6000 -t4 -z
'NORMAL:-CIPHER-ALL:+AES-256-CBC:-VERS-TLS-ALL:+VERS-TLS1.0'
result: 490 rps
siege -c 100 -r 60 (setup cipher via siegerc: ECDHE-RSA-AES256-SHA)
result: 500 rps
Keep-alive:
ab -c 100 -n 60000 -k
result: 22 000 rps
httpress -c100 -n6000 -t4 -z
'NORMAL:-CIPHER-ALL:+AES-256-CBC:-VERS-TLS-ALL:+VERS-TLS1.0'
result: 42 000 rps
siege -c 100 -r 600 (setup cipher via siegerc: ECDHE-RSA-AES256-SHA)
result: unable to complete the test due to excessive failures; tried to
test against nginx - same result
Plain http test (non-keep-alive):
siege -c 100 -r 1000
result: 11 000 rps
ab -c 100 -n 100000
result: 16 000 rps
httpress -c 100 -n 100000 -t4
result: 44 000 rps
Plain http test (keep-alive):
siege -c 100 -r 4000
result: 25 000 rps
ab -c 100 -n 400000 -k
result: 71 000 rps
httpress -c 100 -n 1000000 -t4 -k
result: 180 000 rps
On Tue, Jan 17, 2012 at 6:16 PM, Nikos Mavrogiannopoulos <nmav@gnutls.org>wrote:
> On Tue, Jan 17, 2012 at 1:10 AM, Yaroslav <yarosla@gmail.com> wrote:
> > Hi,
> > I thought this might be interesting for some people on this list.
> > I'd like to announce addition of SSL support to
> > httpress: https://bitbucket.org/yarosla/httpress/
> > Compared to ApacheBench and siege httpress offers greatly improved
> > performance. As well as precise cipher suite selection via command line
> > option.
>
> Interesting. Did you notice differences in the web servers performance
> comparison by using operations in parallel in httpress?
>
> regards,
> Nikos
>
[Attachment #5 (text/html)]
The difference is huge. Here are some results.<div><br></div><div>Running tests \
against nxweb server, minimal c handler '<p>Hello, world!</p>' \
(20 bytes).</div><div>Ubuntu 11.10 x64, 4 core CPU without AES-NI support.</div> \
<div><br></div><div>Testing cipher suite:</div><div>ab info: \
TLSv1/SSLv3,ECDHE-RSA-AES256-SHA,2048,256</div><div>httpress info: \
ECDHE_RSA_AES_256_CBC_SHA1</div><div><div>- Key Exchange: ECDHE-RSA</div><div>- \
Ephemeral ECDH using curve SECP256R1</div> <div>- Protocol: TLS1.0</div><div>- \
Certificate Type: X.509</div><div>- Compression: NULL</div><div>- Cipher: \
AES-256-CBC</div><div>- MAC: \
SHA1</div></div><div><br></div><div>Non-keep-alive:</div><div><br></div><div>ab -c \
100 -n 6000</div> <div>result: 380 rps</div><div><br></div><div>httpress -c100 -n6000 \
-t4 -z 'NORMAL:-CIPHER-ALL:+AES-256-CBC:-VERS-TLS-ALL:+VERS-TLS1.0'</div><div>result: \
490 rps</div><div><br></div><div>siege -c 100 -r 60 (setup cipher via siegerc: \
ECDHE-RSA-AES256-SHA)</div> <div>result: 500 \
rps<br><br><div>Keep-alive:</div><div><br></div><div>ab -c 100 -n 60000 \
-k</div><div>result: 22 000 rps</div><div><br></div><div>httpress -c100 -n6000 -t4 -z \
'NORMAL:-CIPHER-ALL:+AES-256-CBC:-VERS-TLS-ALL:+VERS-TLS1.0'</div> \
<div>result: 42 000 rps</div><div><br></div><div>siege -c 100 -r 600 (setup cipher \
via siegerc: ECDHE-RSA-AES256-SHA)</div><div>result: unable to complete the test due \
to excessive failures; tried to test against nginx - same result<br> </div><br>Plain \
http test (non-keep-alive):</div><div><br></div><div>siege -c 100 -r \
1000</div><div>result: 11 000 rps</div><div><br></div><div>ab -c 100 -n \
100000</div><div><div>result: 16 000 rps</div><div><br></div><div> httpress -c 100 -n \
100000 -t4</div><div>result: 44 000 rps</div><div><br></div><div><div>Plain http test \
(keep-alive):</div><div><br></div><div>siege -c 100 -r 4000</div><div>result: 25 000 \
rps</div><div><br></div><div>ab -c 100 -n 400000 -k</div> <div><div>result: 71 000 \
rps</div><div><br></div><div>httpress -c 100 -n 1000000 -t4 -k</div><div>result: 180 \
000 rps</div></div></div><div><br></div><br><div class="gmail_quote">On Tue, Jan 17, \
2012 at 6:16 PM, Nikos Mavrogiannopoulos <span dir="ltr"><<a \
href="mailto:nmav@gnutls.org">nmav@gnutls.org</a>></span> wrote:<br> <blockquote \
class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc \
solid;padding-left:1ex"><div class="HOEnZb"><div class="h5">On Tue, Jan 17, 2012 at \
1:10 AM, Yaroslav <<a href="mailto:yarosla@gmail.com">yarosla@gmail.com</a>> \
wrote:<br>
> Hi,<br>
> I thought this might be interesting for some people on this list.<br>
> I'd like to announce addition of SSL support to<br>
> httpress: <a href="https://bitbucket.org/yarosla/httpress/" \
target="_blank">https://bitbucket.org/yarosla/httpress/</a><br> > Compared to \
ApacheBench and siege httpress offers greatly improved<br> > performance. As well \
as precise cipher suite selection via command line<br> > option.<br>
<br>
</div></div>Interesting. Did you notice differences in the web servers \
performance<br> comparison by using operations in parallel in httpress?<br>
<br>
regards,<br>
Nikos<br>
</blockquote></div><br></div>
_______________________________________________
Gnutls-devel mailing list
Gnutls-devel@gnu.org
https://lists.gnu.org/mailman/listinfo/gnutls-devel
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic