Jump to content
Not connected, Your IP: 34.200.252.156

Recommended Posts

5 hours ago, Shiver Me Whiskers said:

 

@Staff Time to bring those 10gbit servers 😉
1.0gbit is not enough anymore... hehe !


Definitely! Coincidentally, in a completely different context, I've just had to check the connection speed from a DitigalOcean droplet in Frankfurt to a server in Barcelona (~700mi,  ~1125km):

speedtestfrankfurt.png.088522fd6a2089c7e0a27f8b79118fab.png

I nearly fell off my chair. Of course this is without any kind of encryption, but you're not going to get anywhere near these kind of figures on 1.0Gbps servers!

 

Share this post


Link to post
6 hours ago, Staff said:
@Shiver Me Whiskers

Hello!

The previous record did not last long, apparently. :) If you don't mind, which connection protocol, cipher and port did you pick?

Kind regards
 
Hello, I'm a bit of a noob when it comes to these things ;)

I downloaded Eddie 2.19.5, installed it on Windows 10, connected, and started downloading...
It used "wintun", and I think connected via AES-256-GCM
. 2020.11.19 16:28:18 - Eddie version: 2.19.5 / windows_x64, System: Windows, Name: Windows 10 Enterprise, Version: Microsoft Windows NT 10.0.19042.0, Mono/.Net: v4.0.30319
. 2020.11.19 16:28:19 - Tun Driver - 0901: 9.24.3; wintun: 0.8
. 2020.11.19 16:28:19 - OpenVPN - Version: 2.5.0 - OpenSSL 1.1.1h  22 Sep 2020, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
. 2020.11.19 16:28:19 - SSH - Version: plink 0.73
. 2020.11.19 16:28:19 -     Build platform: 64-bit x86 Windows
. 2020.11.19 16:28:19 -     Compiler: clang 7.0.0 (tags/RELEASE_700/final), emulating Visual Studio 2013 (12.0), _MSC_VER=1800
. 2020.11.19 16:28:19 -     Source commit: 745ed3ad3beaf52fc623827e770b3a068b238dd5 (C:\Program Files\AirVPN\plink.exe)
. 2020.11.19 16:28:19 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe)
I 2020.11.19 16:28:20 - Ready
. 2020.11.19 16:28:20 - Collect information about AirVPN completed
I 2020.11.19 16:28:22 - Session starting.
I 2020.11.19 16:28:22 - Checking authorization ...
! 2020.11.19 16:28:22 - Connecting to Tarazed (Netherlands, Alblasserdam)
. 2020.11.19 16:28:23 - OpenVPN > OpenVPN 2.5.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 28 2020
. 2020.11.19 16:28:23 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit
. 2020.11.19 16:28:23 - OpenVPN > library versions: OpenSSL 1.1.1h  22 Sep 2020, LZO 2.10
. 2020.11.19 16:28:23 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.11.19 16:28:23 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.11.19 16:28:23 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2020.11.19 16:28:23 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2020.11.19 16:28:23 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.135:443
. 2020.11.19 16:28:23 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2020.11.19 16:28:23 - OpenVPN > UDP link local: (not bound)
. 2020.11.19 16:28:23 - OpenVPN > UDP link remote: [AF_INET]213.152.161.135:443
. 2020.11.19 16:28:23 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.135:443, sid=f7f5cc8d 3b14c77f
. 2020.11.19 16:28:23 - OpenVPN > VERIFY KU OK
. 2020.11.19 16:28:23 - OpenVPN > Validating certificate extended key usage
. 2020.11.19 16:28:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2020.11.19 16:28:23 - OpenVPN > VERIFY EKU OK
. 2020.11.19 16:28:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tarazed, emailAddress=info@airvpn.org
. 2020.11.19 16:28:23 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
. 2020.11.19 16:28:23 - OpenVPN > [Tarazed] Peer Connection Initiated with [AF_INET]213.152.161.135:443
...
. 2020.11.19 16:28:23 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2020.11.19 16:28:23 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2020.11.19 16:28:23 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
...
. 2020.11.19 16:28:23 - OpenVPN > open_tun
. 2020.11.19 16:28:23 - OpenVPN > wintun device [WinTUN] opened
...
! 2020.11.19 16:28:31 - Connected.
. 2020.11.19 16:28:31 - OpenVPN > Initialization Sequence Completed

(removed some unimportant stuff especially at the end to keep the log to keep it short, I have over 10 NIC devices due to use of VMs, makes the log huge)

ISP is KPN (Netherlands), fiber, so I am pretty close to your VPN servers, 1 gbit plan ( 1000/500 )

Computer config: AMD Ryzen 7 3700X, DDR4-3733 CL16, 2.5 gbits LAN all the way to the KPN Router (that came with the plan, didn't use any fancy expensive router)
I think the AMD CPU has very good AES acceleration, because during those transfer I barely noticed any CPU utilization at all... like 20% on one single core ?
 

Share this post


Link to post
28 minutes ago, Shiver Me Whiskers said:

Computer config: AMD Ryzen 7 3700X, DDR4-3733 CL16, 2.5 gbits LAN all the way to the KPN Router (that came with the plan, didn't use any fancy expensive router)
I think the AMD CPU has very good AES acceleration, because during those transfer I barely noticed any CPU utilization at all... like 20% on one single core ?


Hello!

Yes, of course, it's plausible. OpenVPN runs in a single core so you will see load on one core only  AES New Instructions are nowadays well implemented in all desktop CPUs and SSL libraries such as OpenSSL are built to fully use them whenever possible.
 
Quote


I think it's safe to say that this is the fastest commercial VPN in the world right now 😉


We hope so! 😎

On the server side we mitigate OpenVPN multi-threading lack by running multiple daemons. Each daemon "runs in a core" and our servers balance with a round robin algorithm the incoming client connections. Therefore a server can use all the cores.. Although each client connects to a single daemon (except in special configurations such as https://nguvu.org/pfsense/pfsense-multi-vpn-wan/ ), of course, load balancing provides remarkable "distributed benefits" anyway.

Kind regards
 

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...