this post was submitted on 02 Dec 2023
19 points (91.3% liked)

Selfhosted

39435 readers
2 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 1 year ago
MODERATORS
 

I'm thinking about building a box for pfsense. Looking at hardware options and I see a pretty significant difference in price when comparing hardware with and without AES-NI. I don't necessarily think I'll need AES. The way I understand it, AES is for using VPN that is somehow running on the router??? I mean, my wife and I both use VPNs on our work computers so we can reach our work networks, but that isn't using any encryption features on my router, is it?? Or am I not understanding?

top 11 comments
sorted by: hot top controversial new old
[–] [email protected] 40 points 11 months ago (1 children)

You should consider opnsense instead of pfsense in any case.

[–] [email protected] 2 points 11 months ago (1 children)
[–] [email protected] 15 points 11 months ago

The company behind pfSense is shady as hell:

https://opnsense.org/opnsense-com/

Also the complete and utter clusterfuck of an attempt to bring Wireguard into the FreeBSD kernel:

https://arstechnica.com/gadgets/2021/03/buffer-overruns-license-violations-and-bad-code-freebsd-13s-close-call/

[–] [email protected] 8 points 11 months ago

If installing Wireguard as your VPN is a possibility, Install Opnsense + Wireguard on old hardware and forget about AES.

[–] [email protected] 6 points 11 months ago* (last edited 11 months ago)

Any VPN that terminates on the firewall (be it site to site or remote access / "road warrior") may be affected, but not all will. Some VPN tech uses very efficient computations. Notably affected VPNs are OpenVPN and IPSec / StrongSwan.

If the VPN doesn't terminate on the firewall, you're in the clear. So even if your work provided an OpenVPN client to you that's affected by AES-NI, because the tunnel runs between your work laptop and the work server, the firewall is not part of the encryption pipeline.

Another affected technology may be some (reverse) proxies and web servers. This would be software running on the firewall like haproxy, nginx, squid. See https://serverfault.com/a/729735 for one example. In this variation of the check, you'd be running one of these bits of software on the firewall itself and either exposing an internal service (such as Nextcloud) to the internet, or in the case of squid doing some HTTP/S filtering for a tightly locked down network. However, if you just port forwarded 443/TCP to your nextcloud server (as an example), your nextcloud server would be the one caring about the AES-NI decrypt/encrypt. Like VPN, it matters to the extent of where the AES decrypt/encrypt occurred.

Personally, I'd recommend you get AES-NI if you can. It makes running a personal VPN easier down the road if you think you might want to go that route. But if you know for sure you won't need any of the tech I mentioned (including https web proxy on the firewall), you won't miss it if it's not there.

Edit: I don't know what processors you're looking at that are missing AES-NI, but I think you have to go to some really really old tech on x86 to be missing it. Those (especially if they're AMD FX / Opteron from the Bulldozer/Piledriver era) may have other performance concerns. Specifically for those old AMD processors (Not Ryzen/Epyc), just hard pass if you need something that runs slightly fast. They're just too inefficient.

[–] [email protected] 5 points 11 months ago

Encryption and Decryption can be resource intensive processes. Most firewalls typically have a lower throughout for VPN connections than they do for just straight routing because of the extra processing power required for VPN. Based on what little I've read, it seems like CPU's with AES-NI are capable of handling the encryption process more efficiently which probably reduces system load and allows for more throughput.

This only helps in situations where your firewall is either serving or connecting to a VPN. It won't make any difference if your connecting to a work VPN form your computer. Even if you are hosting a VPN connection from your firewall, AES-NI is probably overkill unless you're planning to connect a bunch of clients to it at the same time or plan to do something like file transfers at Gigabit speeds.

[–] [email protected] 4 points 11 months ago

It's for encryption and decryption so only valid for VPN tunnels initiated by pfsense. Not a needed feature by any means if you don't selfhost stuff and want to setup VPN tunnels and run a lot of traffic through (like say media through Jellyfin)

[–] [email protected] 3 points 11 months ago

I'm not sure what you're shopping for with AES-NI but I can strongly recommend the HP T730 and T740 thin clients if you're trying to build a budget home firewall machine. Both support AES-NI (but obviously not Xeon QAT) and the t730 is cheap on eBay. Drop whatever NIC and an SSD in and you're off to the races with OPNSense. The T740 is performant enough to run OPNSense on Proxmox if that's your thing, you'll have plenty of spare processing time to do something else on the machine beyond routing/firewalling a 1-2Gb home connection.

[–] [email protected] 3 points 11 months ago

Pfsense has an openvpn server and client built in. Also if you are using site-to-site ipsec vpns it can be useful. I think it will also use the extensions if you run a web proxy to inspect tls traffic. If you just use it for a nat gateway, then you don't need aes-ni or even most of the features Pfsense provides.

[–] [email protected] 1 points 11 months ago

If you don't use a VPN on the router, you won't need it.

But what if you decide to set one up so you can VPN in while on the road? Personally, I'd rather have it and not need it, than need it and not have it...as well as "buy once, cry once" rather than need to upgrade down the line.

[–] [email protected] 1 points 11 months ago

Acronyms, initialisms, abbreviations, contractions, and other phrases which expand to something larger, that I've seen in this thread:

Fewer Letters More Letters
HTTP Hypertext Transfer Protocol, the Web
IP Internet Protocol
SSD Solid State Drive mass storage
TCP Transmission Control Protocol, most often over IP
VPN Virtual Private Network
nginx Popular HTTP server

[Thread #332 for this sub, first seen 3rd Dec 2023, 15:35] [FAQ] [Full list] [Contact] [Source code]