What VPN does Sup Forums use?

What VPN does Sup Forums use?

Other urls found in this thread:

security.stackexchange.com/questions/14068/why-most-people-use-256-bit-encryption-instead-of-128-bit
ntop.org/products/deep-packet-inspection/ndpi/
twitter.com/SFWRedditImages

Openvpn with aes-256-cbc cipher, 4096b RSA key authentication, a non standard port and LZO data compression.
1 server at home and 1 on my mail VPS. That lets me only open ssh, smtp submission and imap ports on the VPS to my home IP and anyone on the VPN tunnel interface and still be able to access it from anywhere.

none

My country isn't cucked enough to require a vpn for basic internet browsing and torrenting

...for now

Your country has no public wifi hotspots?

What's a vpn?

Are you joking or do you actually not know?

>using public wi-fi
Just use your phone or make a hotspot from your phone's unlimited data.

Kids know fucking shit.

>proof

viral porn name

Betternet
Always free ^ω^

Who or what is Sup Forums?

I only torrent games and the occasional album. I don't leave my client running 24/7 downloading every piece of shit movie that comes out like all the dipshits who get warning letters from their ISPs.

This. OpenVPN masterrace.

mullvad

Shadowsocks is faster, cant be blocked by dpi and works much better on poor wifi/4g connections.

>a non standard port
what's the point?

I have a friend in Lithuania who has a VPN for me to use on his Synology server
It's free and more reliable than a company

>Openvpn with aes-256-cbc cipher
Enjoy your massive crypto overhead and slowdown for minimal security gain over aes-128

>b-but more == better!
Nope. security.stackexchange.com/questions/14068/why-most-people-use-256-bit-encryption-instead-of-128-bit

The one I selfhost on a VPS.

If someone has a 0-day for OpenVPN, they're less likely to find out that it's there.
I'm not some commercial VPN provider who has to worry about efficiency. The VPS only has to run Postfix, Dovecot and OpenVPN with me being the only user. CPU usage hovers below 5%.

>security.stackexchange.com/questions/14068/why-most-people-use-256-bit-encryption-instead-of-128-bit
But it is more secure, only slower. Depends on your priority, also cpu's are cheap.

What's the point? Vps can be traced to you. Unless you're according government censors, that's pointless. May as well stay on your own ip

>Enjoy your massive crypto overhead and slowdown for minimal security gain over aes-128
AES-256 is just as fast as AES-128 on modern CPUs with AES-NI support.

is it worth sacrificing possibly having that port blocked for?

With a commercial VPN it's clear to people between you and it that you're using a VPN and the VPN's IPs are likely to be blocked by services either because of abuse by other users or because they aren't allowed to provide services to people concealing their location.

By who?

public access points

Why would they block it?
What makes it more likely to get blocked than the standard port?

I should probably add that it's in the dynamically allocated range.

lots of APs in airports and such block everything but 80 and 443.

Well, they're not gonna have the standard 1194 open anwyway, are they?
Although now that you mention it, moving it to 443 might be a good idea.

OpenVPN over TCP can share port 443 with a web server. When someone accesses it with a browser they get the normal website.

Search for OpenVPN+port+sharing

...

My own SSH tunnel with RSA key-based authentication. Don't want my university knowing what sites I go to.

>tfw no stalker 2

>brown
Nasty

3DPD

OpenVPN could be easily blocked on any port.
ntop.org/products/deep-packet-inspection/ndpi/

Go-vpn
>It uses fast strong passphrase authenticated key agreement protocol with augmented zero-knowledge mutual peers authentication (PAKE DH A-EKE). Encrypted, authenticated data transport that hides message's length and timestamps. Optional encryptionless mode, that still preserves data confidentiality. Perfect forward secrecy property. Resistance to: offline dictionary attacks, replay attacks, client's passphrases compromising and dictionary attacks on the server side. Built-in heartbeating, rehandshaking, real-time statistics. Ability to work through UDP, TCP and HTTP proxies. IPv4/IPv6-compatibility. GNU/Linux and FreeBSD support.

I started using the free VPN included in Opera's Developer edition. But now I discover that they are actively blocking my favorite download sites.