Is it considered secure to use the TP-Link routers OpenVPN server to access my home network remote via public IP?
As an open source project it is always adapting and improving. Recent audits revealed minor issues that were resolved quite quickly.
It is not owned by any major corporation who would have the ability to turn over information.
It is considered one of the safest VPNs.
If your router is supported by openwrt I would recommend flashing it with that and running WireGuard instead
Thanks for your great answers. I can’t install software on my router (TP-Link AX73). I guess that the updates for the router will get less priority from TP-Link as it gets older and more unsecure.
I am running a Proxmox server with 2 unused NICS. Would it be better for me to create a VM running pfSense and pass it the two NICS instead and then run a VPN server from that? (I am not a network wizard)
It is owned by a corporation though. They make money selling Access Server licenses and OpenVPN Cloud seats, as well as support. As it’s open source, you can definitely host it yourself but it’s worth separating the different editions available.
Because it’s much faster or because there’s a security difference? The OP is asking about security, so your answer may imply WireGuard is more secure.
Yes. Fair point. They are a corporation that has a paid service.
I guess what I meant was they are separate from the other major data corporations.
Both are secure, however Wireguard is considered easier to audit because it has only 4,000 lines of code compared to OpenVPN which is hundreds of thousands of LOC. Also Wireguard has been part of the Linux kernel since Linux 5.6, which leads to more eyes on it and also means it is more performant.
I can definitely attest that their self hosted open source, plus Access Sever ones do not send any logs (I think maybe some telemetry about server version but nothing about clients). The only one they could potentially access information is OpenVPN Cloud.