New servers, new everything. Retireing OpenVPN for Wireguard. And I like it ... a lot.
2 months ago ยท ๐ drh3xx, tm85, me
@me In Russia WG was the first thing that got blocked, there are ways to circumvent that by wrapping WireGuard traffic, ProtonVPN's Stealth uses this (it's basically WireGuard over a TLS) โ but these are all quirks, making it work on a router or a VPN box might be problematic, while OpenVPN is old and tried solutions โ it's also easy to detect and block, but they usually choose not to, as it's being used legitimately by businesses, they prefer blocking select VPN providers' entry nodes by IP address instead. ยท 1 month ago
I use wireguard to connect my smartphone to my home network to get the advantage of DNSBL and IP blocking malicious actors and ads. ยท 2 months ago
So far using it for server to server connections between a few root servers and bringing in my local workstation. But also considering adding pretty much all of the various networks and machines into a big mesh. Tailscale looks interesting. OpenVPN has served me well but cert management and speed where always on the annoying side for me. ยท 2 months ago
@me To dodge ISP/organization blockage, I use wstunnel in HTTPS mode on 443, and I'm considering cloak. Has been without issues so far.\r\n@drh3xx Been using tailscale with headscale after years on nebula. It's miraculous. Glad to see it getting use and joy ยท 2 months ago
downside is that wireguard can be very easiely blocked through an isp. in iran all wireguard traffic is blocked, while openvpn works... just as a constructive input :) ยท 2 months ago
I made the switch from OpenVPN to Tailscale (WG based) and haven't looked back. Headscale is also an option for those wanting to keep anyone else (other than potentially a VPS provider) out of the loop. ยท 2 months ago