Over the last 6 months, we have been designing a whole new approach to Infrastructure. The first two new servers that support the new infrastructure has gone online this evening. We urge users to try out the new servers and give us feedback on performance. There are some great new features baked into these servers. Here are the highlights

Old Server Cipher(s) Supported: AES-256-CBC
New Server Cipher(s) Supported: AES-256-GCM:AES-256-CBC:AES-128-GCM:AES-128-CBC
Old TLS Cipher(s) Supported: TLS-DHE-RSA-WITH-AES-256-CBC-SHA
New TLS Cipher(s) Supported: TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384:TLS-DHE-RSA-WITH-AES-256-CBC-SHA256:TLS-ECDHE-RSA-WITH-AES-128-GCM-SHA256:TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256:TLS-DHE-RSA-WITH-AES-256-CBC-SHA
IPv6 will be  fully supported on the new servers very soon. 
Lz4 compression is being tested to see if it has any real world performance benefits. 

Currently the LiquidVPN software has no built in way to change your ciphers. If you are using a version from 1.28+ your connection will use the following defaults for the beta servers.

cipher AES-256-GCM 
tls-cipher TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384

If your using a version below 1.28 the beta servers will default to
cipher AES-128-CBC
tls-cipher TLS-DHE-RSA-WITH-AES-256-CBC-SHA


If you are using another VPN client like OpenVPN's community edition client and you generate your own configuration files you can adjust the ciphers manually via the OpenVPN config file. These servers follow the same no log policy that our non-beta servers so we really need your input on performance, errors, requests, and concerns.


Thank You
The LiquidVPN Team
Friday, July 14, 2017


« Back