From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail.toke.dk (mail.toke.dk [45.145.95.4]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by lists.bufferbloat.net (Postfix) with ESMTPS id AD7CF3B29D for ; Wed, 17 Mar 2021 06:54:10 -0400 (EDT) From: Toke =?utf-8?Q?H=C3=B8iland-J=C3=B8rgensen?= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=toke.dk; s=20161023; t=1615978448; bh=ypaZFoQi/+5gKssv6Q1RV+JpaPS5mTi3N3rRd/8s+w8=; h=From:To:Subject:In-Reply-To:References:Date:From; b=T3CCmNz57rEwLWcmQYSPof1BcUucxzhCMmX+bosgi9jhHMB2g4w5tUPlhZ+2W0BjM hcxzkiiMVoNfA1iQdiZr57+ixdgG4TNeOJXmB+LMbaR+38U5+Wg5JecocAKciI6FNM brTnF45Pojl0iTxY7LnKmM7psvPIbpm2afud2VUTuGa0kPtUwjSXGb4uBK7jGvQzUU DSrgXkyObuSfHIpL3gB7ezIc+aPXQ0xWG6jIGPpycmlKsqECrbH6tZ9OrQ2Y47ihvB 4dno6Qi2UQb0KspSGyOFQFvl/bhTzl0FoenFLQh3LX5DmNTeiUsgXKairKi+Il8IhH 44jTBnwWgMViw== To: Matt Taggart , cerowrt-devel@lists.bufferbloat.net Subject: Re: [Cerowrt-devel] Looking for MORE SQM Router Recommendations ! In-Reply-To: References: <1287379027.1155590.1615919208363.ref@mail.yahoo.com> Date: Wed, 17 Mar 2021 11:54:08 +0100 X-Clacks-Overhead: GNU Terry Pratchett Message-ID: <874khadp9r.fsf@toke.dk> MIME-Version: 1.0 Content-Type: text/plain X-List-Received-Date: Wed, 17 Mar 2021 10:54:10 -0000 Matt Taggart writes: > On 3/16/21 11:30 AM, Charles Rothschild via Cerowrt-devel wrote: > > > I want a 1GB capable SQM router. What options are good nowadays hw wise? > > I've been using the Qotom x86 boxes and running x86 OpenWRT on them. > They have no problem doing CAKE on 1gig symmetrical connection. > > http://qotom.net/ and then Products -> Mini PC -> Multiple NIC > > But the Qotom vendor site is confusing and also doesn't list all the > products you can find available. So a while ago I made this decoder ring > > https://we.riseup.net/lackof/x86-router-candidates#qotom Nice list! One comment - the page says this: > The Intel AES-NI cpu extension can really help openssl/wireguard a lot That is true for openssl (and other TLS, even IPSec, I think), but not for wireguard - that doesn't use AES at all, but rather ChaCha20, which is not accelerated by AES-NI (and doesn't need it either). -Toke