Thanks, honestly all my searching about the issue, mtu never came up. I will search it a bit more and give it a try. Thanks for the tip.
VPNs aren’t used for public services.
Interesting stuff. Would failed attempted not even be logged?
That is odd - that’s the opposite of my experience (official app, iPhone XS, iOS 14.6). Everything works pretty seamlessly. Server is Debian with ver from buster-backports (https://wireguard.how/server/debian/).
Looks like your Battery saver program in the background is the culprit. I had to remove WG from battery saving mode.
Is the server behind NAT? I believe persistent keepalive would he helpful here if not already configured. Could be wrong though.
It requires more system resources, but network performance tends to be better in these kinds of cases.
If you had a full-tunnel or permanent site-to-site VPN, WireGuard may not be the best choice (IPSec, OpenVPN, etc. may be better choices), but for client-to-server VPNs (i.e. where the clients may be on flakey wifi, cellular, etc.) WireGuard may be your better choice. A big advantage for mobile is that the tunnel doesn’t really exist until it’s used - so it doesn’t burn battery like other VPN techs that need to maintain constant connections back to home base.
Yea, but 400,000/4000 = openvpn can do 400 more things/features than Wireguard. This is how coding works.
Yeah I did run into that step in the tutorial that I was following, so I made sure to allow all. Didn’t prevent me from having problems, but that’s likely just because I’m an idiot and have no clue what I’m doing, though I am definitely trying to learn haha.
That’s…not what I meant. The whole point is using a port that isn’t blocked outbound.
Of course NTP is blocked inbound often. But outbound? Nah. It’s perfect for bypassing “VPN blockers”.
But are they blocking it inbound or outbound?
No worries. As I say - MTU of 1200 is normally a good start. If you see positive results then have a play with setting the biggest the still works and you’re golden. HMU if you need anything.
Right, they are a public service that you use to more securely connect to your private services
VPN is the public service, silly.
By default no, but apparently can be done…
Honestly, it’s something I wouldn’t worry too much about, as others have mentioned, it’s not worth brute-forcing. May be a good idea to not use the “default” port of 51820, for some added “security through obscurity”, but otherwise it’s not something I’ve ever had a problem with.
*NOTE: I never condone “security through obscurity” as a lone measure, but there’s nothing wrong with adding to an already secure solution.
Why use a swiss army knife when all you need is a screwdriver?
That is not how coding works tf
-
Check your math
-
Nope, not how it works
Lol we’re all the same trust me
Yeah, I meant to reply to him. But nvm you are right, it’s not the same network, it is a kind of useless question. I’ll delete the comment. Thanks for your comment, TIL ntp = udp/123.