As the title says, I have my own instance of OpenVPN running in a vps (default settings). Is that “safe” enough for p2p? Any settings I should change? Anything I should watch out for? I guess it would show that the IP address of my vps will be going to these p2p sites and connecting to the IP address of whoever I’m transferring from, but how hard is it for the vps traffic to be traced back to me?

  • Dsklnsadog@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    20
    ·
    4 days ago

    VPS VPN hides you from ISP but VPS IP still shows to peers → worst case: abuse email/suspension. Use WireGuard, not OpenVPN: faster, leaner, modern crypto. No compression, full-tunnel + DNS leak protection, firewall to block non-VPN traffic, minimal logs. If host’s fine with P2P, you’re set.

    • bender223@lemmy.todayOP
      link
      fedilink
      English
      arrow-up
      2
      ·
      3 days ago

      I keep hearing about WireGuard being better, but also harder to set up and configure, so I went with Openvpn. I’ll look into WireGuard, and see if I’m brave enough to set that up. For the hosting company, they didn’t point out anything against p2p traffic in their TOS. 🤷‍♂️