-
Notifications
You must be signed in to change notification settings - Fork 426
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add benchmarks comparing boringtun with wireguard-go and official kernel-space impl #102
Comments
I would love to see benchmarks myself :) |
Here is my own benchmark result:
Peer B Server:
BoringTun:
Wireguard kernel:
|
@AmirAliSobhGol thank you very much, in your benchmark both peers run WireGuard and then both peers run BoringTun? |
@vkrasnov |
Tailscale improved wireguard-go throughput (on linux) by the factor of 2 https://tailscale.com/blog/throughput-improvements/ |
Tailscale has now improved performance even further. It would be nice to have some official performance comparisons. |
I use wgbench to benchmark linux kernel wireguard and wireguard-go and boringtun. I modified the following line in the script to support wg-go and boringtun: ip netns exec wgbench$i ip link add wgbench$i type wireguard
# ip netns exec wgbench$i wireguard-go wgbench$i
# ip netns exec wgbench$i boringtun-cli --disable-drop-privileges wgbench$i But the result is really strange. Here's the result: Does anyone know why? |
I try to use |
@PinkD I'll try and repro when I get home. |
It would be great if you could add some performance stats for boringtun. I would be also interested in comparison with the kernel-space implementation and wireguard-go.
The text was updated successfully, but these errors were encountered: