New VPN Protocol: SSH2 Tunnels or L2TP/IPSec?

Have Your Say, TUVPN News Add comments

SSH2 for TUVPN ?Whilst still working on our new website, that hopefully will be up & running before the end of this month, we have started to discuss which should be the next VPN protocol/system to be implemented in our network.

We try to make ourselves stand out from the growing number of competitors by offering a service that is very simple to use, with very high quality and very flexible.

To enhance this last characteristic, we plan on introducing a new vpn protocol.

What we have in mind at the moment is either SSH2 Tunnels or L2TP/IPSec.

We think that SSH2 Tunnels would be a very good complement to what we have at the moment (as it allows to protect just a given application while leaving the rest of the traffic outside the tunnel). Only issue is that maybe it might be too technical for most users.

The other option, L2TP/IPSec, is becoming popular amongst other VPN providers. We have never had it in high regard, as it tends to be messy to implement and is easy to block  and has issues as it uses several ports during the different phases of the tunnel creation.

Again, we would love to hear what you have to say about it, an as usual, we will do our best to accommodate what most of you want!

So, please, feel free and start commenting!


Get Your VPN NOW!

10 Responses to “New VPN Protocol: SSH2 Tunnels or L2TP/IPSec?”

  1. Aldo Says:

    Good ideas. I think the SSH2 would be the better of the two to implement ATM. SSH2 correct me if I’m wrong could be implemented in combo with the tuvpn servers to add more protection, anonymity and security? such as connecting to the server via SSH2 and than running VPN server going into proxy server onwards to the web.

    The provider perfect privacy whom your friendly with also provide SSH2 tunnels and they encourage users to use these in combo with the VPN servers.

    Would this be an option with yourselves? and tutorials provided? The OpenVPN software could be ran through a SSH2 tunnel and than do its normal thing of routing traffic through a VPN server for more security.

    The L2TP/IPSEC is alright and I have seen it around but its as you say fiddly and more difficult. Just an alternative to OpenVPN or vice versa depending on what side of the fence your on.

  2. Aldo Says:

    Something else that should be implemented please is the ability to cascade (CHAIN) the existing HTTP elite proxies for more security. This can be done with free software such as Freecap which you enter the servername.name.com and password along with port # as is done in the web browser now.

    The addition perhaps at some stage of SOCKS proxies to the service but for me as well it would be great to be able to chain the proxies here.

    Thank You

  3. Stefan Says:

    I vote for the L2TP/IPSec protocol – superior speed!

  4. Nicko Says:

    Another vote for L2TP. Faster than OpenVPN and SSH2 tunnels. I hope you will implement L2TP on all servers.

  5. letz Says:

    I want both, but IPSec would be my first choice. Far better protection than PPTP (and nearly as fast!). SSH2 tunnels will be to “difficult” to understand for the average user.

  6. tuvpn Says:

    Now that new site and new OpenVPN cipher are in place, we are moving on with this.

    As a greater number of users seem to prefer L2TP/IPSec both here and on twitter, we are going to start researching on implementation during next week. Hopefully we will have a server ready with L2TP/IPSec in a couple of weeks to check performance, stability …

    Will keep you posted !

    TUVPN.COM Team

  7. Daniel Says:

    Wonderful news (read it on Twitter)! I really hope L2TP/IPSec will be available on ALL your servers when it’s fully implemented and tested. Good move – thanks a lot!

  8. Daniel Says:

    Me again. Forgotten one thing: please considering Dynamic RPF support for the L2TP/IPSec protocol as well. Thanks!

  9. Lucia Says:

    Nice to read about the L2TP/IPSec future upgrades. We (The service user) will still have the choice to choose from PPTP, OpenVPN and these new protocols?

    All looking good. I will add in my ideas for future expansion.

    Yes SSH2 would be good at some stage but not in a hurry yet. I think personally it would be wise to allow the existing proxies to be daisy chained to each other at some point plus expand the proxy to Socks5 as well which would enable more anonymity and privacy for users because they could be combined with the main VPN used aswell as the HTTP elite proxy.

    Another GOOD future protocol is SSTP which is used by Windows 7 exclusively I think. Other than that you could test out double cascading on VPN servers.

    For now this is really good but I like to see Socks5 proxy support added in the near future.

    Thanks

  10. Ronnie Says:

    Another vote for L2TP. Faster than OpenVPN and SSH2 tunnels. I hope you will implement L2TP on all servers.

Leave a Reply

*

Get Your VPN NOW!

©2011 TUVPN.COM. All rights reserved.