this post was submitted on 09 Nov 2024
251 points (99.2% liked)

Privacy

32173 readers
1229 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
 

Support will be removed on both client and server side.

The process of removing OpenVPN from our app starts today and may be completed much earlier.

top 50 comments
sorted by: hot top controversial new old
[–] [email protected] 154 points 3 weeks ago (5 children)

TL;DR They are moving to wireguard only.

I'm ok with that.

[–] [email protected] 73 points 3 weeks ago (7 children)

Except the 5 device limit. With OVPN it means 5 connected devices, with WG it means 5 registered public keys.

Say you use the official Mullvad app and also setup some 3rd party WG client on your phone. That's now taking up 2 devices. Or perhaps you do have 6 devices, but you never have more than 2 of them running at once. With WG, that's still 6 devices regardless of them being connected or not, while with OVPN it will indeed be just 2 devices.

[–] gaylord_fartmaster 29 points 3 weeks ago (2 children)

Can you not use the same keys for multiple devices like you'd normally be able to?

[–] JoeKrogan 15 points 3 weeks ago (1 children)

Not at the same time as they would conflict.

[–] gaylord_fartmaster 30 points 3 weeks ago

Well sure, but you effectively still have the same 5-connection limit as long as you manage your keys correctly.

[–] lemming741 4 points 3 weeks ago

That's always borked both connections for me

[–] PunkiBas 14 points 3 weeks ago (1 children)

This is a great point, if they're gonna make this change, they should allow unlimited keys (or at least more than 5) and just limit the number of simultaneous devices on wireguard too. If that's feasable

[–] [email protected] 12 points 3 weeks ago

It might be feasible, but it's a bit awkward to implement because Wireguard is stateless and doesn't know if a client is offline or just hasn't sent any traffic for some time.

[–] [email protected] 8 points 3 weeks ago* (last edited 3 weeks ago) (1 children)

That's a pity.

Is there something preventing you from having the same key ready for use on more than one device? So that two devices that are never connected at the same time can take turns using the same key?

[–] [email protected] 2 points 3 weeks ago
[–] [email protected] 4 points 3 weeks ago

That's true. I use user profiles on GrapheneOS and have to have each profile count as its own device in Mullvad, when obviously I'm not going to be using them simultaneously.

[–] devfuuu 1 points 3 weeks ago

It just sounds easier to think about it with wireguard then. No surprises.

[–] [email protected] 1 points 3 weeks ago (1 children)

One of my devices uses three keys because out of the two local servers I have, they seem to go down every other month, so I need a failover.

[–] [email protected] 1 points 3 weeks ago

Unless they're simultaneously connected you could share the same private key in all of the configs.

[–] [email protected] 0 points 3 weeks ago (1 children)

I can only assume that is the main reason for this change. Pitty.

[–] [email protected] 12 points 3 weeks ago

I already commented on this, but do they actually block you from setting up multiple devices with the same key?

I've had my own server node for a while, there's nothing stopping me from using the same key and config on multiple client devices, as long as I don't connect them at the same time.

I'm not limited to five keys, obviously, but the keys aren't device specific. I could set up just one on the server, and then use it everywhere.

Does Mullwad stop this in some way?

[–] [email protected] 22 points 3 weeks ago (1 children)

Wireguard is more elegant and performant, and has a smaller attack surface. OpenVPN, meanwhile, is a legacy protocol, and retiring it should be a good thing.

[–] [email protected] 8 points 3 weeks ago (1 children)

And when exactly did we declare openvpn a legacy protocol?

[–] [email protected] 18 points 3 weeks ago* (last edited 3 weeks ago) (1 children)

About the same time VPN platforms started migrating away from it

[–] [email protected] 13 points 3 weeks ago* (last edited 3 weeks ago) (1 children)

I feel like that's kind of a case of circular reasoning though: we move away from it because it's legacy, and it's legacy because we're moving away from it... Mind you, I'm no expert on VPNs; this is just something I thought I'd bring to attention here.

[–] [email protected] 2 points 3 weeks ago

That's what makes software legacy; it falls out of popularity. Plenty of terminal applications have barely changed since the 80s, but they're not "legacy" because they're actively used and maintained.

[–] [email protected] 10 points 3 weeks ago

Can someone explain why this is good or bad?

[–] [email protected] 8 points 3 weeks ago (2 children)

Not great if you use the transmission-openvpn docker container. Guess I need to come up with a new plan.

[–] [email protected] 11 points 3 weeks ago (1 children)

Why not use a qbittorrent WireGuard one?

[–] [email protected] 4 points 3 weeks ago (1 children)

Wasn't aware of this. I'll check it out! One annoying thing with Mullvad though is the wireguard keys count against your device limit and I already have problems with that. Using OpenVPN didn't count against the limit. The again I'm also considering switch to Surfshark since its cheaper.

[–] [email protected] 2 points 3 weeks ago* (last edited 3 weeks ago)

Yeah the device limit is annoying. I switched to AirVPN when Mullvad stopped doing port forwarding and it’s been fine so far. But you’d run into the same issue with the device limit.

I’m not a network expert so I honestly don’t know the difference between the two protocols enough to say that they’re any benefit of one over the other, but there might be a reason that WireGuard is becoming the default? Idk honestly.

Anyway, AirVPN still suports port forwarding and supports OpenVPN so might be an alternative for you. They don’t do security audits which is imo sketchy and makes me question if they are honest about their no logs policy, but otoh they have been around for a long time and there hasn’t been any incidence, which makes me think they’re probably good enough for torrenting.

[–] Nurgus 3 points 3 weeks ago

There's also Transmission-Wireguard by the same guy.

[–] [email protected] 5 points 3 weeks ago

It was good to have it as a backup. I primarily use wireguard but now its a single point of failure.

[–] [email protected] 27 points 3 weeks ago (3 children)

If wire guard is just bettr then I don't see any reason to suport OpenVPN anyway.

[–] [email protected] 37 points 3 weeks ago

Legacy devices with OpenVPN support only.

[–] [email protected] 15 points 3 weeks ago* (last edited 3 weeks ago) (2 children)

i can't get wire guard to work on my home network so it is not better for me

edit: to be fair my internet connection is being tapped and recorded by law enforcement so i am assuming that is the problem.

[–] [email protected] 6 points 3 weeks ago (1 children)

Is that with any vpn provider? or hosting your own? And that is kind of a shame I guess you just won't be able to use Mullvad vpn, good thing there are heaps of other options.

[–] [email protected] 3 points 3 weeks ago

only hear about protonvpn

heap?

[–] [email protected] 1 points 3 weeks ago

How are you trying to using WG? I had issues with wg quick up or whatever it is, not bothered to check, but adding wireguard connections as NetworkManager interfaces works flawlessly for me.

[–] [email protected] 6 points 3 weeks ago (1 children)

I can't get WG to work in Qubes. OpenVPN just works

[–] [email protected] 3 points 3 weeks ago* (last edited 3 weeks ago) (1 children)

That's kind of weird, because the reason why I never bothered with (selfhosted) VPNs before Wireguard was because it was the first one that just worked. Granted, due to its nature, you don't get a lot of feedback when things don't work, but it's so simple in principle that there's not a lot that can go wrong. For external VPNs like this, it should just be: Load config, double-check, done.

[–] [email protected] 4 points 3 weeks ago

Now do it on an obscure router firmware

[–] [email protected] 11 points 3 weeks ago (2 children)
[–] [email protected] 20 points 3 weeks ago (2 children)

Wireguard is the gold standard?

load more comments (2 replies)
[–] [email protected] 9 points 3 weeks ago* (last edited 3 weeks ago)
[–] [email protected] 7 points 3 weeks ago (1 children)

Are they going to fix their client so it can work on linux with software like portmaster that controls DNS?

https://github.com/safing/portmaster/issues/445

https://wiki.safing.io/en/Portmaster/App/Compatibility/Software/MullvadVPN

[–] [email protected] 11 points 3 weeks ago (1 children)

I doubt it. Portmaster has a relatively small share of users, and I bet it would be a waste of their resources to try to pin down a bug that is outside the scope of their client's normal functionality.

Best option is to try to fix it yourself and submit a pull request or hope somebody else does it.

[–] [email protected] 3 points 3 weeks ago

Thank you for the tip. It is not necessarily a bug is my understating is that mullvad controls DNS for pirvacy/security issue. So it makes sense from mass market perspective. So this would be more of a feature request.

Never thought of trying to do myseld. I am not an IT guy but FAFO always been my MO lol

[–] [email protected] 3 points 3 weeks ago

any good wireguard documenation? only found few random company blog, some stackoverflow and reddit.

[–] [email protected] 0 points 3 weeks ago (2 children)

Well thats the day I stop using them wtf

[–] [email protected] 13 points 3 weeks ago (1 children)

Why? Wireguard i a great protocol and Mullvad best in class with regards to privacy.

[–] [email protected] 6 points 3 weeks ago* (last edited 3 weeks ago) (1 children)

Because openvpn works easier in complex setups like Qubes or Ubiquity

[–] [email protected] 1 points 6 days ago

Maybe but openvpn is a complex beast with a huge attack surface. Wireguard is beautiful, minimal and even in your use cases no real problem to setup?

[–] [email protected] 1 points 3 weeks ago

mullvad is overrated, i agree. use riseup, calyx, strongswan

load more comments
view more: next ›