New on LowEndTalk? Please Register and read our Community Rules.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
Most Secure VPN Technology/Method
Mahfuz_SS_EHL
Host Rep, Veteran
Hi,
I have heard about many VPN Technology's among them I have used OpenVPN and PPTP only. Now, I need to know which VPN technology/Method is the most secured of all ?? Also I have to add/assign 100 or more static/dedicated IP's on that VPN Method. From this point of view, which is more user-friendly, I mean I will have less difficulty adding IP's !
My definition for secure VPN technology stands that I won't be traceable by anyone.
Thanks.
Comments
That's with any software that tunnels through other IPs... And if it's regarding government, unless you have some crappy setup like Tor, they can still trace you
I wouldn't trust PPTP. There was an exploit not too long ago that allowed people to find your real IP if you had a fully forwarded IP.
With OpenVPN, RUN IPTABLES. Make sure in Windows it's declared a Public Network. However, OpenVPN is the better choice.
Here I get OpenVPN.
PPTP isn't very secure at all, and most people should avoid it if they can.
Otherwise both OpenVPN and L2TP/IPSec are very secure. I'm not sure which one is easiest to configure as far as having that many IP's.
most secure: ipsec
most user friendly: probably pptp
OpenVPN with certificate authentication rather than user/pass, run it on some non-default ports (i.e. 53/UDP, 443/TCP etc.)
cipher AES-256-CBC in openvpn conf file
Disk encryption (LUCS)
Your own DNS servers
L2TP/IPSec comes next (with certificate auth)
If you only want to access internet you can run SQUID and on top of it a SSL tunnel. This is pretty secure too.
or even better: ssh tunnel (with key auth) <- a lot faster than OpenVPN
@liviu This is good but doesn't always do the job :P People don't use VPN just to change their IP. For instance I used to have a VPN setup for allowing only certain LOCAL IPs SSH access.
@Ollie allowing SSH connections only from local IPs post-VPN connections, if that's what you're referring to - even PPTP would do the job just fine.
It's a different thing when the VPN is the single layer (used to access the Internet and such, not only SSH to a certain server)
SSH is secure enough as it is, assuming it's not running on default port, nor allowing users to use 123456 as passwords.
Strictly related to ssh and ease of use, I believe that running SSH on a non-standard port using key based authentication is (at least) as good as allowing SSH connections (u/p auh) only from VPN (local IPs)
Impossible.
Even TOR is traceable...the question is how easily.
The only way to be untraceable is to destroy logs or even better change them for misinformation, at your path
Even then you have your ISPs logfiles that have the Endpoint, Source IP and Traffic flow saved (European data retention covers this also for DCs in most countries)
From these, I could learn that it is impossible to be hidden via any VPN Technology. I will try OpenVPN as I find it easy other than IPsec/any other. PPTP is the one I use for personal use only.
@liviu I suppose
It's always good to have the extra layer of protection though.
You need better anonymity then use a no log vpn{aka a vpn that don't record logs}
I heard about nvpn.net and others you can find on torrentfreak.
You-->No log vpn -->internet should be pretty secured
also choose you vpn location wisely{aka countries with no data retention laws}
Romania, Poland, Moldova , Serbia and Sweden are best from my point of view.
I am not related to these at all its just for information purpose.
Its going to be very hard to trace you...You can use some private proxies on top of vpn if you liked
imo, Sweden is far from being a no-log friendly country after all TPB and Wikileaks scandals.
Romania is also overrated in the "offshores" category on hosting forums, thanks to Voxility which is a provider who doesn't care much about what's going on in their network (i.e. hosting tor exit nodes and such / probably one of the 3 most abuse-friendly providers in Europe)
If someone calls the authorities in RO to report an abuse (except for pirated movies because everyone in RO is using bit torrent), it's likely that the whole rack (and a few full racks around) will be on a truck in the very next hour on the way to the forensics labs. There have been ISPs in RO going out of business for hosting some hacking forums in their network.
There is also a strong coop between US feds and Romanian counter-parts (read: Romanian authorities do whatever the US feds want, whenever they want), so ask yourself what are you planning to do before using a paid VPN in any EU country
Theoretically, you aren't supposed to use any VPN to do illegal stuff.
but in practice, the advertisement such as "no logging, anonymity, privacy, military-grade encryption" etc. is an invitation for those who plan to do illegal stuff