Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Slow upload to server

    Scheduled Pinned Locked Moved OpenVPN
    19 Posts 7 Posters 1.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      michmoor LAYER 8 Rebel Alliance @Marci
      last edited by michmoor

      @Marci Are you testing on WiFi or cellular? Either one your speeds will vary.
      What are the speeds when not on vpn?

      Firewall: NetGate,Palo Alto-VM,Juniper SRX
      Routing: Juniper, Arista, Cisco
      Switching: Juniper, Arista, Cisco
      Wireless: Unifi, Aruba IAP
      JNCIP,CCNP Enterprise

      M 1 Reply Last reply Reply Quote 0
      • M
        Marci @michmoor
        last edited by

        @michmoor On the client side I am testing on cellular, server is connected via cable to ISP.
        The connection on the server side has a 200 Mbit download and 60 Mbit upload line. The client side which I used for the test has 130 Mbit download and 85 MBit upload speed, without VPN.

        H 1 Reply Last reply Reply Quote 0
        • H
          hr1sha @Marci
          last edited by

          @Marci are you using tcp or udp? have you tried increasing sndbuf rcvbuf?

          M 1 Reply Last reply Reply Quote 0
          • M
            Marci @hr1sha
            last edited by

            @hr1sha I am using UDP and I have really good download speed. Therefore I guess the protocol works.

            I have tried setting
            sndbuf 512000;
            rcvbuf 512000;
            push "sndbuf 512000";
            push "rcvbuf 512000";
            on the server side but it did not have any effect (I am not sure about the commands/values, I googled these).

            H 2 Replies Last reply Reply Quote 0
            • H
              hr1sha @Marci
              last edited by

              This post is deleted!
              1 Reply Last reply Reply Quote 0
              • H
                hr1sha @Marci
                last edited by

                @Marci please show your server and client configuration

                M 1 Reply Last reply Reply Quote 0
                • M
                  Marci @hr1sha
                  last edited by

                  @hr1sha
                  Client:

                  dev tun
                  persist-tun
                  persist-key
                  data-ciphers AES-256-GCM:AES-256-CBC
                  data-ciphers-fallback AES-256-GCM
                  auth SHA512
                  tls-client
                  client
                  resolv-retry infinite
                  remote *deleted IP* *deleted port* udp4
                  lport 0
                  verify-x509-name "VPN server Cert" name
                  auth-user-pass
                  remote-cert-tls server
                  explicit-exit-notify
                  

                  Server:

                  reneg-sec 36000;
                  sndbuf 393216;
                  rcvbuf 393216;
                  push "sndbuf 393216";
                  push "rcvbuf 393216";
                  

                  Thanks for looking into this ๐Ÿ‘

                  GertjanG H 2 Replies Last reply Reply Quote 0
                  • GertjanG
                    Gertjan @Marci
                    last edited by Gertjan

                    @Marci said in Slow upload to server:

                    reneg-sec 36000;
                    sndbuf 393216;
                    rcvbuf 393216;
                    push "sndbuf 393216";
                    push "rcvbuf 393216";

                    Noop.
                    These are the option you added manually.

                    edit : and you don't need to add

                    sndbuf 1048576
                    rcvbuf 1048576
                    

                    and these get added as soon as you select :
                    14f938e9-fbdc-4d8b-bd5d-a1b4c28bf2ac-image.png

                    reneg-sec 36000;
                    

                    is more a security thing. Maybe not ok to set this to 10 hours. The default '3600' won't bite you (one hour !)

                    The actual OpenVPN server config looks like a OpenVPN client config.
                    Go console, or better : SSH,, option 8 :
                    It's here : /var/etc/openvpn/serverX/config.ovpn
                    Where X is your server ID, normally it's '1'

                    Here it is :

                    dev ovpns1
                    disable-dco
                    verb 1
                    dev-type tun
                    dev-node /dev/tun1
                    writepid /var/run/openvpn_server1.pid
                    #user nobody
                    #group nobody
                    script-security 3
                    daemon
                    keepalive 10 60
                    ping-timer-rem
                    persist-tun
                    persist-key
                    proto udp4
                    auth SHA256
                    up /usr/local/sbin/ovpn-linkup
                    down /usr/local/sbin/ovpn-linkdown
                    client-connect /usr/local/sbin/openvpn.attributes.sh
                    client-disconnect /usr/local/sbin/openvpn.attributes.sh
                    learn-address "/usr/local/sbin/openvpn.learn-address.sh bhf.net"
                    local 192.168.10.4
                    engine rdrand
                    tls-server
                    server 192.168.3.0 255.255.255.0
                    client-config-dir /var/etc/openvpn/server1/csc
                    tls-verify "/usr/local/sbin/ovpn_auth_verify tls 'bhf.net' 1"
                    lport 1194
                    management /var/etc/openvpn/server1/sock unix
                    max-clients 10
                    push "dhcp-option DOMAIN bhf.net"
                    push "dhcp-option DNS 192.168.3.1"
                    push "block-outside-dns"
                    push "register-dns"
                    push "redirect-gateway def1"
                    client-to-client
                    remote-cert-tls client
                    capath /var/etc/openvpn/server1/ca
                    cert /var/etc/openvpn/server1/cert 
                    key /var/etc/openvpn/server1/key 
                    dh /etc/dh-parameters.2048
                    tls-crypt /var/etc/openvpn/server1/tls-crypt 
                    data-ciphers AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305
                    data-ciphers-fallback AES-256-GCM
                    allow-compression asym
                    persist-remote-ip
                    float
                    topology subnet
                    
                    status /var/log/openvpn.status
                    status-version 1
                    

                    Note : my custom config :

                    4b1fcd5c-d04d-4cad-b3cb-149a04875681-image.png

                    so these are just added to the rest.

                    No "help me" PM's please. Use the forum, the community will thank you.
                    Edit : and where are the logs ??

                    M 1 Reply Last reply Reply Quote 0
                    • H
                      hr1sha @Marci
                      last edited by

                      @Marci try changing the encryption algorithm to 128 and test. A large buffer size is not always a good thing.

                      M 2 Replies Last reply Reply Quote 0
                      • RicoR
                        Rico LAYER 8 Rebel Alliance
                        last edited by

                        Could the iPhone be the bottleneck pushing encrypted traffic?
                        Maybe you can test with another more beefy client device first.

                        -Rico

                        M 1 Reply Last reply Reply Quote 0
                        • M
                          Marci @Gertjan
                          last edited by

                          @Gertjan Thanks for the help, so here is the server config (I deleted some IPs)

                          dev ovpns2
                          verb 1
                          dev-type tun
                          dev-node /dev/tun2
                          writepid /var/run/openvpn_server2.pid
                          #user nobody
                          #group nobody
                          script-security 3
                          daemon
                          keepalive 10 60
                          ping-timer-rem
                          persist-tun
                          persist-key
                          proto udp4
                          auth SHA512
                          up /usr/local/sbin/ovpn-linkup
                          down /usr/local/sbin/ovpn-linkdown
                          client-connect /usr/local/sbin/openvpn.attributes.sh
                          client-disconnect /usr/local/sbin/openvpn.attributes.sh
                          local *IP deleted*
                          engine rdrand
                          tls-server
                          server *IP deleted* 255.255.255.0
                          client-config-dir /var/etc/openvpn/server2/csc
                          username-as-common-name
                          plugin /usr/local/lib/openvpn/plugins/openvpn-plugin-auth-script.so /usr/local/sbin/ovpn_auth_verify_async user TG9jYWwgRGF0YWJhc2U= false server2 1194
                          tls-verify "/usr/local/sbin/ovpn_auth_verify tls 'VPN+server+Cert' 1"
                          lport *port deleted*
                          management /var/etc/openvpn/server2/sock unix
                          max-clients 4
                          push "dhcp-option DOMAIN localdomain"
                          push "dhcp-option DNS *IP deleted""
                          push "redirect-gateway def1"
                          push "redirect-gateway ipv6"
                          capath /var/etc/openvpn/server2/ca
                          cert /var/etc/openvpn/server2/cert 
                          key /var/etc/openvpn/server2/key 
                          dh /etc/dh-parameters.2048
                          tls-auth /var/etc/openvpn/server2/tls-auth 0
                          data-ciphers AES-256-GCM:AES-256-CBC
                          data-ciphers-fallback AES-256-GCM
                          allow-compression no
                          persist-remote-ip
                          float
                          topology subnet
                          sndbuf 524288
                          rcvbuf 524288
                          push "sndbuf 524288"
                          
                          push "rcvbuf 524288"
                          

                          I have also removed the manual entry for regen-sec and send/receive buffer (I used the pfSense GUI to set the send/receive buffer)

                          1 Reply Last reply Reply Quote 0
                          • M
                            Marci @hr1sha
                            last edited by

                            This post is deleted!
                            1 Reply Last reply Reply Quote 0
                            • M
                              Marci @Rico
                              last edited by

                              @Rico That is a bit difficult for me as I am lacking the infrastructure for this test. I would need a PC/laptop in a different WLAN which I do not have.

                              1 Reply Last reply Reply Quote 0
                              • M
                                Marci @hr1sha
                                last edited by

                                @hr1sha Great ๐Ÿ˜„ that solved the issue, I am now getting the expected upload speed.
                                I guess that means I have been limited by the iPhone hardware (like also @Rico suspected).

                                I chose 256 encryption because I thought it is safer that 128, but after some quick research I guess 128 should be sufficiently safe (I guess).

                                1 Reply Last reply Reply Quote 0
                                • U
                                  upgradeyard
                                  last edited by upgradeyard

                                  This post is deleted!
                                  1 Reply Last reply Reply Quote 0
                                  • First post
                                    Last post
                                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.