On Sun, May 14, 2017 at 3:52 AM, Mick <michaelkintz...@gmail.com> wrote:
>> I had some problems setting up OpenVPN that were solved by using
>> per-client public keys. That seems to be the best supported
>> configuration (as well as the most secure). Windows-side using
>> OpenVPN-GUI is very easy.
>>
>> OpenVPN tends to have poor bandwidth due to overhead, but that may be
>> in large part due to my connection.
>
> OpenVPN is not the most efficient VPN implementation for connections to a
> server because it is not multithreaded and also because unlike IKE/IPSec it
> operates in userspace, not in kernelspace.  If you have more than one client
> connecting to the server at the same time you will need to set up multiple
> instances with different ports or different protocols.  With IKE/IPSec you
> don't.  MSWindows PCs come with IKEv2 natively so they can be configured to
> use it without installing additional client applications.
>
> A VPN connection will expose each endpoint's LAN to the other and therefore
> additional firewall configurations could be required.
>

That is only in one setup. It is possible to assign an IP address to
OpenVPN such that you will need any traffic to cross onto your LAN.

>> >> OpenVPN also offers transparent compression which can be a big
>> >> plus for your scenario.
>> >
>> > Not really, a lot of data is images, usually JPEG, some ZIP files, some
>> > PDF.  All that doesn't compress too well.
>> >
>> >> OpenVPN is not too difficult to setup, and the client is available for
>> >> all major OSes. And it's not too complicated to use: Open VPN
>> >> connection, then use your file transfer client as you're used to. Just
>> >> one simple extra step.
>> >
>> > I'm finding it a horrible nightmare, see above.  It is the most
>> > difficult thing you could come up with.  I haven't found any good
>> > documentation that explains it, the different types of it, how it works,
>> > what to use (apparently there are many different ways or something, some
>> > of which require a static IP on both ends, and they even give you
>> > different disadvantages in performance ...), how to protect the
>> > participants and all the complicated stuff involved.  So far, I've
>> > managed to stay away from it, and I wouldn't know where to start.  Of
>> > course, there is some documentation, but it is all confusing and no
>> > good.
>>
>> Feel free to start a thread on it. As above, I recommend
>> one-key-per-client and running your own CA.
>
> For secure connections you will have to set up CA and TLS keys with any
> option.  Even ftps - unless the ftp server is already configured with its TLS
> certificates.
>

No, certain OpenVPN modes allow encryption without a CA, but they are
limited (e.g. single user, single password, etc).

Reply via email to