AES-NI is a set of CPU instructions on x86 architectures. It exists to increase the performance of AES operations on those CPUs. For security, it is irrelevant if it is done in software or in hardware. The same plain text with the same key must result in the same cipher text.
I read all you write. I don't understand what you talk about. Why is that that important? I asked about AESNI.
I just signed up to the forums and I'm considering switching to OPNSense due in small part to the AES-NI situation with pfSense 2.5 but mainly due to the way they conduct themselves on HN and Reddit regarding the change.I noticed also that they're not longer supporting 32-bit in 2.4 but made an exception for their own ARM SG1000 (32-bit ARM CPU) it also doesn't feature AES-NI (it has its own cryptographic hardware that implements AES in hardware) but it too will get release 2.5.But of course if we (the community) wish to use 2.4 on 32-bit we're not allowed, nor can we use cryptographic accelerators or architectures that have their own crypto hardware which isn't AES-NI.So I have to agree that this whole situation feels like planned obsolescence to get community members to purchase branded hardware.And that is why I'm here really, I don't like the way things are going there and I've woken up to the realities that they're moving away from openness to make money.Regardless though I'm happy to be here and learning about OPNSense.
Quote from: mkolenc on May 06, 2017, 08:57:36 pmI read all you write. I don't understand what you talk about. Why is that that important? I asked about AESNI.Why is what important? I don't understand either. You'll have to be more specific.Cheers,Franco
I asked for explanation about AESNI use for performance only. You replied in three posts talking about pfSense but did not explain why you think AESNI is only for performance. It's important because I use OPNsense for security. Please advise.
Cache-timing attacks were first introduced by Bernsteinin 2005, who showed how to complete an AES key recoveryfrom known-plaintext timings of a network server on anothercomputer. He used a Pentium III as targeted server andconjectured that the same attack could be carried out againstsoftware running on many other CPUs. In the last part of hispaper, he encourages future work by applying the same attackto other CPUs and other severs. He implies that with thedifficulty of writing constant-time high speed AES software, itwould be surprising if any AES-based server were immune.