Jump to content
TorGuard
Anile8er

Torguard Speed Test Best Settings Speed vs Security

Rate this topic

Recommended Posts

Anile8er

Was looking to find the best balanced settings for Torguard providing the most security with only a reasonable hit to throughput but could not find much details online. I decided to run some throughput tests on a few combinations of settings to determine the best option. 

The tests were done using speedtest.net using the same fixed remote server for all tests. In Torguard using the pin feature, I also fixed the VPN server IP for all tests. Throughput obviously varied based on server/ISP load but not by much. Also any test combinations where the numbers seemed to not make sense, I verified by doing the test again.

Fixed Variables

- Software Version - v3.90.0

- Used OpenVPN. I did test with OpenConnect with not much difference in speed and from the research so far OpenVPN is a more secure reliable option as of now.  

- Used UDP. TCP was about 40% slower than UDP and for general PC use losing a few packets has almost no noticeable effect. 

- Port - 1195 (SHA 256)

- All other settings excluding the configuration changes listed below in the test were at default values.

- Tests were done in order of security level (low to high) starting with Torguard completely disabled. 

 

Test Results

Encryption Network Settings  DL (Mbps) Loss
Torguard Disabled Torguard Disabled 193 0%
AES-128-CBC Default 164 15%
AES-128-GCM Default 166 16%
AES-256-CBC Default 160 20%
AES-256-GCM Default 155 24%
AES-256-CBC Block Outside DNS = On  Name Server = None 163 19%
AES-256-GCM Block Outside DNS = On  Name Server = None 176 10%
AES-256-CBC Block Outside DNS = On  Name Server = VPN DNS 161 18%
AES-256-GCM Block Outside DNS = On  Name Server = VPN DNS 175 11%
AES-256-CBC Block Outside DNS = On  Name Server = Google 163 17%
AES-256-GCM Block Outside DNS = On  Name Server = Google 163 18%
AES-256-CBC Block Outside DNS = Off  Name Server = VPN DNS 164 18%
AES-256-GCM Block Outside DNS = Off  Name Server = VPN DNS 164 18%

 

Summary

-Using AES-256 vs  AES-128 showed minor drop in throughput. 

-Adding the extra layers of security under DNS to prevent DNS resolve leaks had no negative impact on throughput.

-Surprisingly after multiple repeat tests AES GCM (more secure) seems to provide better results using some of the DNS settings. 

Again there are obviously alot of other variables that would have impacted some of the results so they cannot be 100% accurate. It is also a limited test only taking 2 servers in to account but it does give a decent general idea as to what the best balanced options would be.

Based on this test, the last configuration (in green) is  the most secure option with a low amount of loss in throughput.

 

Hope this helps any questions or corrections let me know.  

  • Thanks 1

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×