New on LowEndTalk? Please Register and read our Community Rules.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
Comments
Honestly I have not tried it. I might have to add that to my todo list. I can't see why not though.
I think I have resolved my problem. The solution, running it on port 1194. I had previously been using port 443 and 80, assuming these would help me on more restrictive networks.
Will need a few days before I can be sure though.
I do know, but he just said "Put your openvpn connection through an SSL tunnel". Well, OpenVPN was already a SSL tunnel.
Well technically SSL was created to encrypt HTTP text based traffic. I believe OpenVPN was created after TLS was created, and SSL discouraged. :P
I always felt that we can use the wording TLS for any type of encrypted traffic that uses handshakes to securely pass symmetric keys. SSL on the other hand was created for HTTPS. Although people still use TLS and SSL as synonyms.
@kcaj
If nothing happens, set link-mtu on both server and client config to your internet interface MTU (1500, for example). This will set MTU on tun device so OpenVPN won't internally fragment packets.
For TCP do all the above and add the following:
tcp-nodelay
Softether is fine, but it's missing a lot of advanced settings. You can't tune almost anything in IPSec, for example.