Thanks for the information about the old firmware versions.
Yes you are right. I currently have these basic settings:
#WAN
#Firewall
Code:
Enable Firewall = Yes
Enable DoS protection = Yes
Respond ICMP Echo (ping) Request from WAN = No
#System
Code:
Router Login Password = Strong
Enable SSH = Lan Only
Allow SSH Port Forwarding = No
SSH Port = Changed
Allow Password Login = No
Authorized Keys = Yes (+ private Key with strong password)
Code:
Authentication Method = HTTPS
HTTPS LAN port = Changed
Installed Server Certificate = Yes
Code:
Enable Web Access from WAN = No
Enable Access Restrictions = Yes (x2 devices of my network)
Note: In that option: "Allow Password Login = No", I have disabled to reject USER + PASSWORD login requests from SSH, only with the private key. Is this configuration/thought correct?
So what comes to my mind, for example these two "options":
- an infected client
- OpenVPN service vulnerability/misconfiguration (server/client) - I use this option a lot.
Is WireGuard currently more secure than OpenVPN? Or have the vulnerabilities not yet been discovered/exposed?