- cross-posted to:
- openbsd@lemmy.ml
- cross-posted to:
- openbsd@lemmy.ml
.
For server-to-server connection is great. For username/password authentication, it’s surely not the best tool
I tried setting up a Wireguard VPN for myself but failed to figure it out. I’m definitely going to give this a look when I get some free time.
I used to run my own OpenVPN in the past, but have since switched to the free ProtonVPN tier with wireguard.
One usecase for me is accessing local video streaming services for my kids when traveling (they are geoblocked outside of the country). Other than that, I’m mostly using Tor for privacy purposes these days.
You can try this, it should be working for you. If you prefer, there’s also a FreeBSD version linked at the beginning of the blog post.
Are there advantages using the OpenBSD vs. FreeBSD methods (aside from user preference of operating system)?
It’s not really a big deal, but it’s “nice”, philosophically speaking: all the tools the author uses are actually included in the base OpenBSD system whereas on FreeBSD you have to install some packages.
OpenBSD places high value on providing an operating system that is so-called “secure by default” meaning when you install it, you shouldn’t need to perform any hardening in order to achieve maximum security so long as you are careful in your configurations. They also try very hard to provide a diverse range of high quality tools to minimize the need to install external packages as these packages cannot be practically subjected to the same level of scrutiny as the base system.
Pro tip for vps provider: https://wiki.sdf.org/doku.php?id=sdf_virtual_private_server_service