SFTPGo can easily saturate a Gigabit connection on low end hardware with no special configuration, this is generally enough for most use cases.
For Multi-Gig connections, some performance improvements and comparisons with OpenSSH have been discussed here, most of them have been included in the master branch. To summarize:
- In current state with all performance improvements applied, SFTP performance is very close to OpenSSH however CPU usage is higher. SCP performance match OpenSSH.
- The main bottlenecks are the encryption and the messages authentication, so if you can use a fast cipher with implicit messages authentication, such as
aes128-gcm@openssh.com
, you will get a big performance boost. - SCP protocol is much simpler than SFTP and so, the multi-platform, SFTPGo's SCP implementation performs better than SFTP.
- Load balancing with HAProxy can greatly improve the performance if CPU not become the bottleneck.
Server | |
---|---|
OS | Debian 10.2 x64 |
CPU | Ryzen5 3600 |
RAM | 64GB 2400MHz ECC |
Disk | Ramdisk |
Ethernet | Mellanox ConnectX-3 40GbE |
Client | |
---|---|
OS | Ubuntu 19.10 x64 |
CPU | Threadripper 1920X |
RAM | 64GB 2400MHz ECC |
Disk | Ramdisk |
Ethernet | Mellanox ConnectX-3 40GbE |
Baseline
: SFTPGo version 0.9.6.Devel
: SFTPGo commit b0ed1905918b9dcc22f9a20e89e354313f491734, compiled with Golang 1.14.2 .Optimized
: Various optimizations applied on top ofDevel
.Balanced
: Two optimized instances, running on localhost, load balanced by HAProxy 2.1.3.OpenSSH
: OpenSSH_7.9p1 Debian-10+deb10u2, OpenSSL 1.1.1d 10 Sep 2019
Server's CPU is in Eco mode, you can expect better results in certain cases with a stronger CPU, especially multi-stream HAProxy balanced load.
The Message Authentication Code (MAC) used is hmac-sha2-256
.
Download:
Stream | Baseline MB/s | Devel MB/s | Optimized MB/s | Balanced MB/s | OpenSSH MB/s |
---|---|---|---|---|---|
1 | 150 | 243 | 319 | 412 | 452 |
2 | 267 | 452 | 600 | 740 | 735 |
3 | 351 | 637 | 802 | 991 | 1045 |
4 | 414 | 811 | 1002 | 1192 | 1265 |
8 | 536 | 1451 | 1742 | 1552 | 1798 |
Upload:
Stream | Baseline MB/s | Devel MB/s | Optimized MB/s | Balanced MB/s | OpenSSH MB/s |
---|---|---|---|---|---|
1 | 172 | 273 | 343 | 407 | 426 |
2 | 284 | 469 | 595 | 673 | 738 |
3 | 368 | 644 | 820 | 881 | 1090 |
4 | 446 | 851 | 1041 | 1026 | 1244 |
8 | 605 | 1210 | 1368 | 1273 | 1820 |
Download:
Stream | Baseline MB/s | Devel MB/s | Optimized MB/s | Balanced MB/s | OpenSSH MB/s |
---|---|---|---|---|---|
1 | 220 | 369 | 525 | 611 | 558 |
2 | 437 | 659 | 941 | 1048 | 856 |
3 | 635 | 1000 | 1365 | 1363 | 1201 |
4 | 787 | 1272 | 1664 | 1610 | 1415 |
8 | 1297 | 2129 | 2690 | 2100 | 1959 |
Upload:
Stream | Baseline MB/s | Devel MB/s | Optimized MB/s | Balanced MB/s | OpenSSH MB/s |
---|---|---|---|---|---|
1 | 208 | 312 | 400 | 458 | 508 |
2 | 360 | 516 | 647 | 745 | 926 |
3 | 476 | 678 | 861 | 935 | 1254 |
4 | 576 | 836 | 1080 | 1099 | 1569 |
8 | 857 | 1161 | 1416 | 1433 | 2271 |
Cipher aes128gcm@openssh.com
With this cipher the messages authentication is implicit, no SHA256 computation is needed.
Download:
Stream | Baseline MB/s | Devel MB/s | Optimized MB/s | Balanced MB/s | OpenSSH MB/s |
---|---|---|---|---|---|
1 | 332 | 423 | <-- | 583 | 443 |
2 | 533 | 755 | <-- | 970 | 809 |
3 | 666 | 1045 | <-- | 1249 | 1098 |
4 | 762 | 1276 | <-- | 1461 | 1351 |
8 | 886 | 2064 | <-- | 1825 | 1933 |
Upload:
Stream | Baseline MB/s | Devel MB/s | Optimized MB/s | Balanced MB/s | OpenSSH MB/s |
---|---|---|---|---|---|
1 | 348 | 410 | <-- | 527 | 469 |
2 | 596 | 729 | <-- | 842 | 930 |
3 | 778 | 974 | <-- | 1088 | 1341 |
4 | 886 | 1192 | <-- | 1232 | 1494 |
8 | 1042 | 1578 | <-- | 1433 | 1893 |
Download:
Stream | Baseline MB/s | Devel MB/s | Optimized MB/s | Balanced MB/s | OpenSSH MB/s |
---|---|---|---|---|---|
1 | 776 | 793 | <-- | 832 | 578 |
2 | 1343 | 1415 | <-- | 1435 | 938 |
3 | 1815 | 1878 | <-- | 1877 | 1279 |
4 | 2192 | 2205 | <-- | 2056 | 1567 |
8 | 3237 | 3287 | <-- | 2493 | 2036 |
Upload:
Stream | Baseline MB/s | Devel MB/s | Optimized MB/s | Balanced MB/s | OpenSSH MB/s |
---|---|---|---|---|---|
1 | 528 | 545 | <-- | 608 | 584 |
2 | 872 | 849 | <-- | 975 | 1019 |
3 | 1121 | 1138 | <-- | 1217 | 1412 |
4 | 1367 | 1387 | <-- | 1368 | 1755 |
8 | 1733 | 1744 | <-- | 1664 | 2510 |
- AES-CTR optimization of Go compiler for x86_64, there is a patch that hasn't been merged yet, you can apply it yourself.
Here is the relevant HAProxy configuration used for the Balanced
test configuration:
frontend sftp
bind :2222
mode tcp
timeout client 600s
default_backend sftpgo
backend sftpgo
mode tcp
balance roundrobin
timeout connect 10s
timeout server 600s
timeout queue 30s
option tcp-check
tcp-check expect string SSH-2.0-
server sftpgo1 127.0.0.1:2022 check send-proxy-v2 weight 10 inter 10s rise 2 fall 3
server sftpgo2 127.0.0.1:2024 check send-proxy-v2 weight 10 inter 10s rise 2 fall 3