Udp i faster than tcp , but more dificult to bound than tcp
I mean a comparison in performance,overhead,reliability etc between EOIP and OpenVPNEDIT: OpenVPN is an encrypted, certificate based VPN. EOIP is not. No comparison...
EoIP will perform faster. For one EoIP is just using a plain GRE tunnel with a few Mikrotik added extensions and OpenVPN is an encrypted tunnel. Obviously EoIP will be faster. Currently reliability would be greater with EoIP as the Mikrotik implementation of OpenVPN only supports TCP which is problematic when running TCP over TCP.
I mean a comparison in performance,overhead,reliability etc between EOIP and OpenVPN
+1, we need answer to this question. It may or may not easy to implement this feature, but OpenVPN (the original one) has both TCP and UDP support, it's incomplete implementation right now. We need the UDP and LZO compression too. Please, just say a date eg. 2011. July and we'll wait for it, but now we don't have any info....
Anyway, please anyone respond, this is getting very old, and yes, very frustrating.
We also have SSTP now, which works great and has the same benefits as OpenVPN. It's currently not popular yet, and (except RouterOS) it's supported only in Windows, but technically it's very interesting.
Yeah, except IPSEC is severely lacking... So again, you are left with MPPE-128 instead of 192/256bit certificate VPNs... There are many applications where there is a legal, or procedural requirement to use certificates.To be honest, L2TP does work rather nicely
I think the official opinion on this is "Why do you need that, if you want UDP based tunneling use L2TP"
To be honest, L2TP does work rather nicely
Gimme!Maybe the difference is that I use beta3 ?
OpenVPN is very very buggy and hard to implement. Our developers almost all committed suicide trying to make it work. It's a big mess, so we can't continue to implement it 100%Why is Mikrotik ignoring all those request for UDP based OpenVPN and proposing and TCP VPN solution as an alternative ?
OpenVPN is very very buggy and hard to implement. Our developers almost all committed suicide trying to make it work. It's a big mess, so we can't continue to implement it 100%Why is Mikrotik ignoring all those request for UDP based OpenVPN and proposing and TCP VPN solution as an alternative ?
Previously, I had Windows and linux clients connecting to it... The only difference is the limitation on the Windows side and not being able to do point-to-point addresses (Windows will only do a /30 in the tap32 interface).Another problem with it, client and server end must match configuration 100%. if you have different clients connecting, this will be a huge pain to get done. OpenVPN is hard to configure. Maybe not for you, but in comparison to our other options.
What about automatically locking topic after let say 6 months of inactivity?Thank for bringing up a thread more than a year old.
not all topics get irrelevant after 6 monthsWhat about automatically locking topic after let say 6 months of inactivity?Thank for bringing up a thread more than a year old.
Well, I am ready to move from OpenVPN, but I need a good, speedy solution. My setup is:Thank for bringing up a thread more than a year old.
The answer was clear - We will not make new OpenVPN features.
Yes, it was "clear" (not satisfying but not the point here ) but in a general manner I'm wondering why you would "implement" this. What is the relation between openvpn server code in rOS and upstream OpenVPN server.Thank for bringing up a thread more than a year old.
The answer was clear - We will not make new OpenVPN features.
any news with udp and openvpn soon ? I am now forced to use openvpn and would need to change routers on 4 or 5 locations if can't made that working.
Thank you in advance,
Dejan
The answer was clear - We will not make new OpenVPN features.
Is it a joke or what?
1) UDP is suggested from openvpn creators and works better than tcp
2) apart from this ALL MY PARTNERS HAVE OPENVPN ON UDP and they will not change their setup because I HAVE A MIKROTIK. They laugh and says to me that debian or pfsense is free....
They may have no idea how angry future ex-consumers can cripple a business.eastern european developers can be vengeful bunch...
For me I think that ovpn yes or no is not the only parameter to select routeros or other products. I'm sure that if it was a simple implementation they would have done it years ago.They may have no idea how angry future ex-consumers can cripple a business.eastern european developers can be vengeful bunch...
well, we test software all the time that does not meet our specific needs (often for unintelligible reasons) and we move on since you cannot really make demands on anyone unless you are the one writing the paychecks. people who buy licenses are just cattle but this is extra strange. i mean, they even modified openvpn to accept multiple encryption types (totally worthless), but they could not be bothered to allow to accept both/either protocol? makes no sense to me!They may have no idea how angry future ex-consumers can cripple a business.eastern european developers can be vengeful bunch...
Putting standard OpenVPN in ROS would be great. And as much as WinBox is probably the main reason why I like ROS so much, I'd happily make an exception for OpenVPN and live with "paste your text config here" type of GUI.... but it should be relatively simple just to compile it and make a very simple user interface to it.
So... Based on this thread. Does OpenVpn and Mikrotik work? And if so, is it only between Mikrotik and Mikrotik? If this is the case, does Mikrotik have a VMWare appliance I can run? Then I can have the MT to MT scenario with their version of openvpn
I assume MikroTik reimplemented the protocol from scratch. The most probable reason is simple- GPL. Totally IMHO.I'm interested if Mikrotik's implementation based on original OpenVPN package, or they wrote their own compatible implementation? (i don't think the last one, since the first is free and working and original -so why waste time and money with it?)
Missed this one - thank you, MartinEmrich!I used this tutorial http://blog.poettner.de/2011/05/27/open ... rd-411750/. Don't forget to move to Port 2 after flashing...
+1, thank you.Missed this one - thank you, MartinEmrich!I used this tutorial http://blog.poettner.de/2011/05/27/open ... rd-411750/. Don't forget to move to Port 2 after flashing...
It may not be 'available' for buying, but they are in some luck individual's hands and they perform very well.EdgeMax is not yet available for buying. And no idea how it will perform, as it is in the "baby" stage. I will buy at least 3 as soon as they are available
Yes, EdgeMAX supports UDP for OVPN.I just hope they support OpenVPN UDP.
I just don't get it why MTK refusest to implement this feature. Their passive-agressive answers on this forum are at least weird. They are inviting you to look someplace else. Too bad, it is a great product, flawed by some really bad choices. Too much "russian" approach in this product development.
That's great news ... do you have any more info on their ovpn implementation (lzo, push route, certificate based auth) ... MT lacks all of theese features.Yes, EdgeMAX supports UDP for OVPN.I just hope they support OpenVPN UDP.
I just don't get it why MTK refusest to implement this feature. Their passive-agressive answers on this forum are at least weird. They are inviting you to look someplace else. Too bad, it is a great product, flawed by some really bad choices. Too much "russian" approach in this product development.
Easy, search google for vyatta openopen VPN.That's great news ... do you have any more info on their ovpn implementation (lzo, push route, certificate based auth) ... MT lacks all of theese features.Yes, EdgeMAX supports UDP for OVPN.I just hope they support OpenVPN UDP.
I just don't get it why MTK refusest to implement this feature. Their passive-agressive answers on this forum are at least weird. They are inviting you to look someplace else. Too bad, it is a great product, flawed by some really bad choices. Too much "russian" approach in this product development.
JF
For me this topic will never become irrelevant as long it is not implemented.not all topics get irrelevant after 6 monthsWhat about automatically locking topic after let say 6 months of inactivity?Thank for bringing up a thread more than a year old.
You mean like paying a second time for a "feature" you already bought? Mmmmmm...what about offering a bounty for OpenVPN to Mikrotik?
+1, but normis already said they aren't working on OpenVPN any more. And personally I'd rather see 802.11ac with wireless controller support first, but OpenVPN over UDP would be nice.I've already read many threads here about requests for UDP support for OpenVPN and I wasn't able to find one explanation why it is not supported or why it is not planned to be supported :-/ It's really shame :/
So count me as another customer "begging" for this feature. I think there is plenty of us.
Thanks, I had to miss the thread where was this info (you know, there are many threads about UDP / OVPN ). And personally UDP for OVPN is still my priority+1, but normis already said they aren't working on OpenVPN any more. And personally I'd rather see 802.11ac with wireless controller support first, but OpenVPN over UDP would be nice.I've already read many threads here about requests for UDP support for OpenVPN and I wasn't able to find one explanation why it is not supported or why it is not planned to be supported :-/ It's really shame :/
So count me as another customer "begging" for this feature. I think there is plenty of us.
I don´t really know why they are not inserting all known variants of the VPN!Is it a joke or what?
1) UDP is suggested from openvpn creators and works better than tcp
2) apart from this ALL MY PARTNERS HAVE OPENVPN ON UDP and they will not change their setup because I HAVE A MIKROTIK. They laugh and says to me that debian or pfsense is free....
If only they could listen!if mikrotik added these openvpn client features it would be able to connect to 99% of "standard" servers, no raw configuration needed:
- comp-lzo support
- some way to disable auth-user-pass (the servers i configure to have mikrotik clients must have a dummy auth script, what a joke!)
- tls-auth key support
- udp support (+fragment/mssfix)
This is not the solution. With metarouter my router's CPU gets horribly overloaded so much that my whole LAN starts lagging (RB2011).If you really need those features at the moment. Run openwrt image in metarouter and run ovpn from there with full feature set.
I understand that you advise me to buy a router which works fine openWRT and use that router but not mikrotik?If you really need those features at the moment. Run openwrt image in metarouter and run ovpn from there with full feature set.
All of you, Go and vote your support here : http://forum.mikrotik.com/viewtopic.php?f=1&t=86461
+ 1000000+1
UDP + LZO
+ 1000000+1
UDP + LZO
but that mikrotik continually ignore our requests
I don't think we need all features of OpenVPN. UDP support requires the same effort as TCP support, which I find hard to believe would be difficult at all. When I configure OpenVPN by hand, it is a single line where I write either "TCP" or "UDP". Not exactly rocket science. I don't believe that implementing that should trigger any suicide. Almost every OpenVPN implementation I have worked with is using UDP for performance reasons. The choice to use TCP to me is very strange anyhow.OpenVPN is very very buggy and hard to implement. Our developers almost all committed suicide trying to make it work. It's a big mess, so we can't continue to implement it 100%Why is Mikrotik ignoring all those request for UDP based OpenVPN and proposing and TCP VPN solution as an alternative ?
I second tls-auth support. I work for an ISP that offers VPN services to our internet connectivity customers and if RouterOS supported TLS auth, we would sell *a lot* of these devices. The demand for our VPN keeps growing every day, more and more customers are looking to do "whole home VPN", and are struggling to find an inexpensive, "off the shelf" router that supports this with OpenVPN. I have wished a long time for myself and them ROS could do tls-auth.if mikrotik added these openvpn client features it would be able to connect to 99% of "standard" servers, no raw configuration needed:
- comp-lzo support
- some way to disable auth-user-pass (the servers i configure to have mikrotik clients must have a dummy auth script, what a joke!)
- tls-auth key support
- udp support (+fragment/mssfix)
At first I could not understand either, but now I do:Yes please, OpenVPN is in a urgent need of an update, I can't understand why this is being ignored for such a long time.
Well if to go on their website you can scroll through the Licensing page and you can clearly see there are 3 types of licensing, the first two are related to their own Access Server implementation and not the case we look for and the third one is the OpenVPN® Open Source Community Software which I suppose is the one most use, so if there are any licensing problems then those must be tied to these two:At first I could not understand either, but now I do:Yes please, OpenVPN is in a urgent need of an update, I can't understand why this is being ignored for such a long time.
I thought that there was just a standard OpenVPN daemon running on the MikroTik, which maybe had to be updated to a
recent version and some config widgets added to the GUI.
But in one of the many posts about this subject it was revealed that this is not the case. The OpenVPN on RouterOS is an own
implementation that does only part of the protocol. And of course, extending that to a full version takes a lot of work.
I don't know why the existing and widely used OpenVPN is not used, but it may be a licensing issue.
I have had another router that once offered OpenVPN and after an update this functionality vanished without explanation.
Maybe the OpenVPN folks are actively pursuing use of their software outside of their conditions (e.g. in a close-source product).
We all know that. But there is no indication whatsoever there will ever be a V7. So that is useless info.Unless this viewtopic.php?f=1&t=77898&start=150#p546841
post has been invalidated. It will be in V7.
True. I am more curious as to if the issues making it take so long are the ones I brought up.We all know that. But there is no indication whatsoever there will ever be a V7. So that is useless info.Unless this viewtopic.php?f=1&t=77898&start=150#p546841
post has been invalidated. It will be in V7.
People are waiting for something they can use, don't want to be referred to some future product that may or may not
become available in 3 years time.
What's new in 7.0 alpha
*) added support for UDP OpenVPN;
U are So funny m8teaser:
Code: Select allWhat's new in 7.0 alpha *) added support for UDP OpenVPN;
OK CoolIt is actual copy from actual changelog.
LZO compression and SHA2 (SHA512) authentication come to mind...Hmm, alpha... it looks like we may get something ready for this thread's 10th anniversary. I just hope that other nice OpenVPN features will also make it to the party.
This is a 12 year old request. What is going on?? Had to switch all of my VPN clients to other routers simply because of this. Mikrotik OpenVPN was 600+ms ping time and LOTS of packet loss. PPTP or IPsec was 90ms. But, OpenVPN is the only tech that the NSA can't break and that is truly secure. Also, it is the only one besides PPTP that AT&T's routers will allow to have servers.It's a long standing request, and shouldn't be a lot of work.
don't agree. routeros openvpn implementation sure is not complete neither perfect, but I have no problems on many ovpn over tcp tunnels I have. I don't have the big latency even if I ping traversing 2 tunnels.This is a 12 year old request. What is going on?? Had to switch all of my VPN clients to other routers simply because of this. Mikrotik OpenVPN was 600+ms ping time and LOTS of packet loss. PPTP or IPsec was 90ms. But, OpenVPN is the only tech that the NSA can't break and that is truly secure. Also, it is the only one besides PPTP that AT&T's routers will allow to have servers.It's a long standing request, and shouldn't be a lot of work.
Did you really buy an access point to establish OpenVPN connection(s) ?!I very disappointed to read this topic after i brought MikroTik hAP ac².
I prepare to install OpenVPN server in hAP ac2.Did you really buy an access point to establish OpenVPN connection(s) ?!I very disappointed to read this topic after i brought MikroTik hAP ac².
It is possible but it will just be a server with very limited options.I prepare to install OpenVPN server in hAP ac2.
Really agree your comment.After all this I start to think it would be better when MikroTik simply relabled the OpenVPN feature: name it something like MikroTikVPN and don't suggest any compatability to OpenVPN.I prepare to install OpenVPN server in hAP ac2.
At least, they give the user a answer. Yes or no. It is very easy to answer. I don't know why they always silence.Nah, give it a little time (*1), it will happen. Check it yourself, how the attitude changes from "no way" to "we already have it" (*2):
search.php?keywords=openvpn&author=normis
It's getting more optimistic over the time.
-
(*1) two or five years, ten maximum
(*2) at least a part of it
Link, please.What silence are you talking about? The answer was already given: "v6 - no UDP, v7 - UDP is ready, just wait for v7 itself".
search.php?keywords=openvpn&author=normisLink, please.
Even more.v7 should be developed over FOUR Years.
When it's ready.When we can get the v7 ?
I just wait until they ready. I hope my router is worked when they ready.search.php?keywords=openvpn&author=normisLink, please.
Even more.v7 should be developed over FOUR Years.
When it's ready.When we can get the v7 ?
Please post this only once a couple of month/years, not every weekwe're still waiting +1
wondering why one would go with ShA512 ... what is the big benefit (security/performance balance in mind) going with that?LZO compression and SHA2 (SHA512) authentication come to mind...Hmm, alpha... it looks like we may get something ready for this thread's 10th anniversary. I just hope that other nice OpenVPN features will also make it to the party.
from here :
https://www.reddit.com/r/Windscribe/com ... ard_setup/
how about SHA512 auth,
I can not use my windscribe account
Please enumerate your list of commercial routers (not alternative firmware) that actually have OpenVPN support that conforms to your wishes.The long waiting time makes me so sad! Products and software - this is not a good match. One is good the other is a joke!
Yes, it would be very good to have metarouter back in service, or some other way of running user programs in some sandbox that only gives them some memory, a disk directory, and one or more network interfaces towards the physical router (tun/tap or similar).Another solution would be to support and maintain Metarouter.... even on the RB1100AHx2, but that's another story.
What about TLS auth and no username/password auth (only by keys)?LZO is deprecated, so you should be asking for LZ4 instead
well ...LZO is deprecated, so you should be asking for LZ4 instead
Instead, pay them to implement the suggestion in message viewtopic.php?p=692031#p692031+1 for UDP.
Damn, take 10% of my payments to you for routers and hire a programmer for 6 months to do this (he'll implement it in a few weeks and work for you for the remaining 5 months) :-/ It is so annoying to have CCRs with speed of RB750 running openvpn via TCP..
Although I agree, I believe that would take some serious time. I don't get the point of not implementing already finished UDP support and waiting years for v7.. this reminds me the play "Waiting for Godot" :-/ TCP ovpn between europe and usa is damn slow, I had to go back to the good old l2tp+ipsecInstead, pay them to implement the suggestion in message viewtopic.php?p=692031#p692031
That will serve a lot of other purposes on CCR.
I wonder what router equipment you are going to change to (with software supported by the router manufacturer) that will do what you need...I have to guess what to do, whether to change the equipment or wait
I understand the OpenVPN license is problematic.I wonder what router equipment you are going to change to (with software supported by the router manufacturer) that will do what you need...
What options does Mikrotik have for a UDP (or at least not TCP) based secure connection that I could use to tunnel an EoIP connection?In a similar situation (which involved only us and 1 other party) I was successful in convincing them that only offering OpenVPN and not IPsec, L2TP/IPsec or similar was not very flexible.
Implementing such services on a router is silly. You should implement it on your end device so the entire path is protected.NordVPN says no. RouterOS is getting outdated.
It's implemented already, just wait for the releasehi, I wanted to know if mikrotik intends to implement the protocol udp
in a far futurejust to know, do you know an approximate release date? I would not wait all 2019 ...
Maybe @normis can say a date, will it be before 2020?just to know, do you know an approximate release date? I would not wait all 2019 ...
Noooooooooo.....Thank for bringing up a thread more than a year old.
The answer was clear - We will not make new OpenVPN features.
A-HA!If you really need those features at the moment. Run openwrt image in metarouter and run ovpn from there with full feature set.
AWS Client VPN is a new managed service that provides you with the ability to securely access your AWS and on-premises networks from anywhere, using OpenVPN-based clients.
The issue is that they re-wrote an OpenVPN implementation instead of just taking the OpenVPN code that everyone uses, and now the original code is being extended all the time and it would be complicated to follow that.And I remember that OpenVPN being too complicated was a reason given it the past, why they stopped with tcp and don't want to touch it anymore.
Go ahead and prove him wrong please.You must be from alternate future.
No problem, just wait for 2040
Go ahead and prove him wrong please.
To be honest, IKEv2 is not as popular as OpenVPN. It's a bit too late.
Please give a list of commercial router manufacturers that do support OpenVPN in their products and which have a level of support that is adequate.To be honest, IKEv2 is not as popular as OpenVPN. It's a bit too late.
RouterOS in general is late.
It's easy ... For example ZyXEL Keenetic: https://help.keenetic.com/hc/en-us/arti ... VPN-clientPlease give a list of commercial router manufacturers that do support OpenVPN in their products and which have a level of support that is adequate.To be honest, IKEv2 is not as popular as OpenVPN. It's a bit too late.
RouterOS in general is late.
(not opensource projects like OpenWRT or Pihole, actual manufacturers like MikroTik, Cisco, Juniper, Netgear, ZyXel, Draytek etc)
I think you'll have to agree that the majority of routers do not support OpenVPN, you may be able to find the odd product that does, but not like client and server across the entire product line of the manufacture, which MikroTik does offer.
The problem with OpenVPN on RouterOS is that it is a re-created implementation that was not further developed once it was "working", and the real OpenVPN product was.
So the MikroTik version became more and more incomplete.
But it is not like OpenVPN is the lingua franca of VPN that everyone supports except MikroTik, and MikroTik is behind for not having it.
You will find many many more routers that do IPsec than OpenVPN.
And there likely is a reason for not using the opensource version. Some time ago I bought a Draytek router and its specs leaflet included OpenVPN.
"nice", I thought, I may be able to use that.
But first thing I did was to bring the firmware to the updated version, and OpenVPN was gone! Not to be found anymore! later it was deleted from the specs leaflet too.
Why? We can only guess...
Well, I not really am into home networking...I think you should look into the router brand that is for home networking
Well, I not really am into home networking...I think you should look into the router brand that is for home networking
When I use VPN, I use it in the traditional way. To connect two networks over a tunnel across internet.
IPsec is normally fine for that.
And again, undoubtedly many open source projects use and support OpenVPN, I have an OpenVPN server running on a Linux box.
However, that is not what I consider "supported by a router manufacturer".
I don't see OpenVPN support in native firmware for brandname network routers like Cisco, Juniper, etc, and for "home routers" it also
appears to be more an exception than the rule.