TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

OpenVPN vs. WireGuard – A Short Comparison

52 点作者 telmich超过 5 年前

14 条评论

vbezhenar超过 5 年前
I tried OpenVPN and IPsec and IPsec works much better for Windows client and Linux server. Also CPU load for server was much lower (I&#x27;m using very low power VPS). I don&#x27;t think that it&#x27;s because of userland implementation, but rather because OpenVPN has some implementation issues. So I&#x27;m using IPsec now. Unfortunately I&#x27;ve hit some problems with IPv6. I managed to configure real IPv6 address from &#x2F;64 VPS subnet for each client, but this configuration does not work reliably.<p>Another problem is that I did not found a way for Windows to keep tunnel up all the time. There&#x27;s some way for &quot;Always on&quot; connection, but I couldn&#x27;t configure it, there&#x27;s no GUI option and it seems to require a lot of powershell magic and no easy to follow tutorials.<p>Another problem with IPsec is that only strongswan can provide adequate implementation. OpenBSD iked daemon can&#x27;t send certificate chain, so I can&#x27;t use Letsencrypt certificate. Libreswan does not support MSCHAP-V2 protocol, so easy configuration with username&#x2F;password is not possible. Also default strongswan configuration does not allow Windows clients to connect without further tweaks (Windows does not want to use strong ciphers and strongswan does not want to use weak ciphers).<p>It&#x27;s a mess.<p>So, yeah, wireguard might be interesting for me, as I still did not find a suitable solution which checks all the boxes. IPsec works for me, but it&#x27;s not ideal.<p>Last time I checked, wireguard for Windows was in beta, but it looks like it&#x27;s stable now according to the website. I guess it&#x27;s worth to try it now.
评论 #20948752 未加载
评论 #20929420 未加载
评论 #20928176 未加载
评论 #20928448 未加载
bryanlarsen超过 5 年前
One thing I like about WireGuard is that beginner tutorial setups for it are point-to-point, which means that it&#x27;s High Availability. If one node goes down only communications to it are lost, the rest of the network is still up. Beginner tutorial setups for OpenVPN are for gateways which have the gateway being a single point of failure.<p>Point-to-point is annoying because you have to update every node when you add or change a node, but we have appreciated the HA aspect of it.<p>Of course I&#x27;m sure you can do point-to-point with OpenVPN and you can do gateways with Wireguard, but the design of them does influence how they&#x27;re used.
darkwater超过 5 年前
Is there a way with wireguard to replicate the &quot;push routes from the server&quot; feature of OpenVPN? I would really like to switch but I cannot find a way to replicate that
评论 #20928330 未加载
评论 #20933250 未加载
评论 #20928319 未加载
Mister_Snuggles超过 5 年前
One big advantage that IPSec has over both OpenVPN and WireGuard is that the client is built in to both iOS and Android so you don&#x27;t have to worry about finding an appropriate client.<p>The last time I tried OpenVPN the client seemed to primarily be a vehicle for displaying ads for a VPN service that I wasn&#x27;t interested in (I wanted to VPN back to my home network, not to an endpoint in another country).
评论 #20928797 未加载
评论 #20929409 未加载
评论 #20928985 未加载
mises超过 5 年前
Wireguard is an excellent choice. Much simpler and faster (lower CPU, according to my bench-marks). It&#x27;s also much better on windows, as it doesn&#x27;t have to use the crufty old tun&#x2F;tap driver. It&#x27;s smooth and easy cross-platform, and so much simpler than openvpn.
cypherpunks01超过 5 年前
What is the current status of WireGuard being added directly to the mainline Linux kernel? I know there was a push to do this awhile back, but as far as I know it has not been added—is that correct, and is it still planned to happen sometime?
评论 #20929512 未加载
评论 #20929582 未加载
p4bl0超过 5 年前
I find that setting up any kind of VPN is always a PITA. I&#x27;m so relieved since I found sshuttle [1].<p>[1] <a href="https:&#x2F;&#x2F;sshuttle.readthedocs.io&#x2F;" rel="nofollow">https:&#x2F;&#x2F;sshuttle.readthedocs.io&#x2F;</a>
评论 #20927862 未加载
评论 #20928307 未加载
评论 #20927721 未加载
RandomTisk超过 5 年前
Does anyone have a good solution for keeping VPNs connected on an iPhone? I&#x27;ve set one up in the past and wanted to always stay connected to my VPN server at home, but I&#x27;ve found the biggest challenge isn&#x27;t setting up the VPN, but making sure it stays connected or reconnects when the signal is interrupted.
评论 #20928362 未加载
评论 #20928475 未加载
评论 #20929154 未加载
评论 #20928056 未加载
mamcx超过 5 年前
I try wireguard between a ubuntu server and my osx and the speed is turtle-slow:<p><a href="https:&#x2F;&#x2F;www.reddit.com&#x2F;r&#x2F;WireGuard&#x2F;comments&#x2F;cor7ze&#x2F;wireguard_from_osx_ubuntu_it_connect_but_web&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.reddit.com&#x2F;r&#x2F;WireGuard&#x2F;comments&#x2F;cor7ze&#x2F;wireguard...</a><p>Is unsolved.
评论 #20929036 未加载
评论 #20929496 未加载
ncmncm超过 5 年前
Doesn&#x27;t have any actual information about either.<p>tl;dr: OpenVPN is ipv4, bad, Wireguard, ipv6, good.
评论 #20927994 未加载
评论 #20928480 未加载
finn319超过 5 年前
Promising, I will give WireGuard a try.
评论 #20929024 未加载
laxentasken超过 5 年前
Got PIVPN (openvpn) running on my raspberry pi. Went almost too smooth to set up.
Snawoot超过 5 年前
Time for shameless plug, but I hope someone will find my experience useful.<p>I tried wide variety of VPN solutions, including Wireguard, IKEv2, OpenVPN, L2TP&#x2F;IPsec, PPTP. Eventually I came to conclusion: I don&#x27;t need VPN at all with all it&#x27;s packet-level machinery, I just need fast encrypted proxy for browser and IM to forward my TCP connections securely.<p>And in practical terms, even Wireguard is not fastest substitution for proxy because packet loss on last mile (roughly) causes delays comparable to RTT between client and destination server versus proxy where retransmit on last mile packet loss occurs only between proxy server and client (it&#x27;s also true for OpenVPN in TCP mode, but it has much more serious downsides caused by packet encapsulation inside stream protocol). Despite that fact Wireguard and other packet-level tunnels have higher theoretical throughput (from server point of view), simple TCP-to-TCP connection forwarding often gains higher practical speeds and more durable if such TCP-forwarding do not depend on state of underlying tunnel. So I decided: forward each TCP connection in separate encrypted connection will be just fine.<p>There already exist software which allows to wrap SOCKS in TLS or SSH (for example stunnel or haproxy for TLS case and OpenSSH for SSH case), but TLS handshake delay for each connection kills speed benefits for typical browsing scenario. Dynamic port forwarding via SOCKS proxy built-in into OpenSSH client has another drawback: all forwarded connections multiplexed into single one and in real networks with packet loss it makes high speeds unapproachable.<p>For these reasons I decided to re-implement both stunnel and OpenSSH client for connection forwarding purposes.<p>Here it is: <a href="https:&#x2F;&#x2F;github.com&#x2F;Snawoot&#x2F;ptw" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;Snawoot&#x2F;ptw</a> - TCP-to-TLS wrapper, which keeps pool of established TLS connections in order to cancel TLS handshake delay. May serve as transparent proxy on Linux router (sends haproxy PROXY-protocol v1&#x2F;v2 in connection prologue) or serve as wrapper for plain SOCKS&#x2F;HTTP&#x2F;whatever proxy.<p>And second one: <a href="https:&#x2F;&#x2F;github.com&#x2F;Snawoot&#x2F;rsp" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;Snawoot&#x2F;rsp</a> - Rapid SSH Proxy, faster [1] replacement to `ssh -ND`. It also uses connection pooling, and, unlike default OpenSSH client, maps TCP connections one-to-one to SSH connections. You don&#x27;t need any setup on server side: working SSH server should be already enough.<p>And this is how I quit hating. Now I don&#x27;t need to turn proxy on&#x2F;off, because it doesn&#x27;t imposes performance penalty. In SpeedTest I achieve almost full connection speed (mine is 100Mbps) with ptw or rsp (versus 50Mbps with wireguard).<p>[1] - <a href="https:&#x2F;&#x2F;github.com&#x2F;Snawoot&#x2F;rsp#performance" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;Snawoot&#x2F;rsp#performance</a>
johnmarcus超过 5 年前
big fan of pritunl vpn. hands down the best vpn interface i&#x27;ve ever used. i would actually say it was pleasant. It only took about an hour to setup my first one, and it&#x27;s like a 15 minute task to setup a new one now. highly recommend it for anyone setting up a new vpn.<p>personally, i found wiresharks documentation confusing and left me unsure of the best practices. im sure if i used it regularly it would be clear, this was just my first impression and then I left it behind.
评论 #20928312 未加载
评论 #20928483 未加载