Encryption: Now It's In Your Control

24

Comments

  • Speeds better (and more consistent) with the new version but (on US East, only on tried so far) still 1/2-1/3 what they should be.
  • Was kind of hoping that with the release of this client, we'd have the issues with Ruby resolved  :(

  • Working great. I'm running Windows 7 and using:

    Data Encryption- AES-256
    Data Authentication- SHA-256
    Handshake- RSA-4096

    Have VPN Kill Switch, DNS, & IPv6 leak protection enabled.

    Working like a charm, no noticeable effect on speed. Web pages maybe taking a fraction of a second longer to load. Fair trade off for the added security. I'm happy with it.
  • Working perfect for me too. I am using the exact same options as Fibonacci.

    The average CPU time used by the new client on my 3.2 Ghz Quad core CPU is 0.67% at full speed of transfer. For the security this provides, that is quite impressive.
  • Works great on Windows 7. Thanks PIA
  • Latest version solved the VPN Kill Switch problem on Windows 8, thanks guys!
  • For the future, I would like to see a build of this with additional DNS options. Since DNS requests are processed on the VPN side of things, it largely does not matter if it is encrypted, but if it is not already using something comparable to DNSCurve, that would be a very nice addition.
    (If I understand how it works, the DNS requests are tunneled through and then sent to be resolved unencrypted from the VPN side. Please clarify if I am mistaken.)

    It would also in some situations be useful to be able to set what DNS servers are used rather than let the client decide. Not everyone has much respect for Google and Level 3.
  • I'm still seeing down speeds ~1/2 what they should be - currently on the Toronto gateway - and the connection is also fluctuating wildly - a few mins at ~2.5 (when it should be ~5) and then down to almost nothing, then building back up, dropping back down.  When the speed drops, upload speed also drops.   :(

  • So far its working really good for me. Good work on this guys I was really anticipating this for a long time.

    When will it be out of beta stages?
  • I am assuming, this is exclusively available via the beta client app?? PFsense shows:

    Sep 23 00:15:56openvpn[50565]: WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
    Sep 23 00:15:56openvpn[50565]: WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
  • I am assuming, this is exclusively available via the beta client app?? PFsense shows:

    Sep 23 00:15:56openvpn[50565]: WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
    Sep 23 00:15:56openvpn[50565]: WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
    I was just about to post this and noticed the same thing I'm getting this. Is it a bug?

    Mon Sep 23 01:39:38 2013 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
    Mon Sep 23 01:39:41 2013 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1570', remote='link-mtu 1542'
    Mon Sep 23 01:39:41 2013 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
    Mon Sep 23 01:39:41 2013 WARNING: 'auth' is used inconsistently, local='auth SHA256', remote='auth SHA1'
    Mon Sep 23 01:39:41 2013 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
  • edited September 2013
    I was just about to post this and noticed the same thing I'm getting this. Is it a bug?
    Not sure, but then I'm no expert. Perhaps, they don't want us accessing the higher encrypted tunnels without the application. I've tried a variety of things, including snooping for different gateway IPs with the app loaded. All attempts end with error log: Authenticate/Decrypt packet error: cipher final failed
  • The reason it doesn't work yet with direct OpenVPN configurations is that we haven't been told all details. Alternative port numbers are used because SSL certificates can't be properly multiplexed on a single port.

    @OmniNegro: Assigning the same DNS servers to all clients actually increases anonymity, because you can't be singled out as easily as if everyone were using different servers. I vote that users who feel the need for other DNS settings continue to change them manually.
  • I did ask about modifying the .ovpn files towards the start of the thread, but it was the only part of my post not answered. Surely if the servers are accepting connections it'll be possible to simply amend the files to incorporate the required changes, until a GUI comes along for *nix?

    Support, can you please let us know the config for this? I'd imagine it's only a matter of editing the files to enter a new set of ports, and a few simple changes to the config to set this up. An easy matter for any *nix user. Thanks.
  • It doesn't work for me with kill switch and DNS leak protection enabled.
  • edited September 2013
    Works since latest update now (Sept 22) ^ before it didn't
  • Works since latest update now (Sept 22) ^ before it didn't
    I have the latest update and it doesn't work.
  • Speed drop. Pings are higher than past few days.
  • Works since latest update now (Sept 22) ^ before it didn't
    I have the latest update and it doesn't work.
    Have you tried other locations? I have no issues on Romania or NL.
  • edited September 2013
    Just making my report. So far it's working pretty great. I haven't really noticed any slow down at all, even with the highest encryption settings. :)

    The only problem I've run into so far, and I've had the same issue on occasion with the release version, it that once in a while the tray icon will show red/disconnected when I'm actually connected. Sometimes I can get it straight by selecting Connect, sometimes that option isn't available. Sometimes I have to exit the client and restart it to get it working right again. But, as I said, I had that happen a few times before I installed the Beta, so, overall, I say: Well done!
  • I'm having the speed fluctuations (full speed, then down to nothing for long periods, then spikes of speed, then back to nothing), regardless of the gateway I select.  I do not experience the same fluctuations when not connected to the VPN.  Only using std encryption & only port forwarding.

  • edited September 2013
    I'm having the speed fluctuations (full speed, then down to nothing for long periods, then spikes of speed, then back to nothing), regardless of the gateway I select.  I do not experience the same fluctuations when not connected to the VPN.  Only using std encryption & only port forwarding.

    Exactly. In all configurations. Currently, it seems fine. 
  • edited September 2013
    Definitely, absolutely *something* with the VPN connection.  No idea what.

    Will try uninstalling & re-installing the client ..... 

    ============

    Tried just re-installing the TAP, no difference
    Uninstalled the new, re-installed the old, slightly better, but still WAY slow.

    I get 6.0MB/s down and 600 KB/s up - with either client, the BEST I'm getting is 1/10TH of that!!!  Something is wrong, and it ain't just in Denmark ....

    Even tried turning Port forwarding off, still no change.

    This is ridiculous.  If a solution isn't found soon.  I'll cut my losses and go with Boehlr.

    ==================

    k, ran DiffProbe while all traffic was STOPPED - this is on the Texas server -

    DiffProbe release. January 2012. Build 1008.
    Shaper Detection Module.

    Connected to server 4.71.251.149.

    Estimating capacity:
    Upstream: 14728 Kbps.
    Downstream: greater than 200 Mbps.

    The measurement will take upto 2.5 minutes. Please wait.

    Checking for traffic shapers:

    Upstream: Measurement aborted due to high packet loss rate.

    Downstream: Measurement aborted due to high packet loss rate.

    That initial assessment was clearly premature.  Something is whacked here .....

  • edited September 2013
    Deathstalker try changing remote port to 9201 or 1194 or 8080 and local port to 53. Disconnect,reconnect and try again
  • @user1234 - all those combinations STILL result in the Up and Down speeds fluctuating.  Everything is fine when I don't have PIA running.

  • If the system is lower power try changing the openvpn process priority to high.
    Good idea is to make a ticket at support. They are really good at helping.
  • edited September 2013
    Does anyone have an estimate when this will be out of beta? So far no problems only these "warnings" in the logs. What do they mean??

    ===============
    WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1570', remote='link-mtu 1542'
    WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
    WARNING: 'auth' is used inconsistently, local='auth SHA256', remote='auth SHA1'
    WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
    ===============
  • @anunnaki: It means you're connecting to the wrong port, were the new encryption options are not yet available.
  • in my log it gives me warnings like that but it does connect at my settings. 

    surely if port was dependent on the encryption settings we choose PIA would have the app connect to the correct port.
  • The warnings mean that the server has different settings than the client. I'm not sure, but I think I remember my OpenVPN to fall back to the server specified settings for the connection. If you see a log line that confirms the crypto settings you have selected, everything should be fine.
Sign In or Register to comment.