Multi-hop v2 network now available

Releases By Ed Holden | Posted on November 26, 2015

We’re extremely excited to launch the much anticipated multi-hop v2 network today. This new network has been built from scratch to offer the highest levels of performance and privacy based on our experience running a VPN network over the last 6 years.

Every server in the network is now both an entry and exit server. When you connect you can choose both where your data will enter into our network and where it will exit providing significantly more flexibility over our existing 3 location setup. Multi-hop is an important privacy  technology as it makes traffic analysis significantly more difficult for adversaries to correlate traffic entering our network with that exiting it. Adversaries would at a minimum require access to the data centers in two different jurisdictions at them same time to identify the source of a connection.

We’ve invested significant time developing a full mesh network so all connections between servers are direct (unlike a hub and spoke model), thereby ensuring the maximum possible speed whilst relaying traffic through multiple servers. Multi-hop servers are located in different countries so it does however come with the cost of higher latency and lower speeds. Customers should therefor carefully consider their threat model when deciding whether it is necessary to use the new multi-hop network over the existing singlehop network which will always be the fastest.

To use the new multi-hop network you can use our latest IVPN v2.4 client launching today or any OpenVPN compatible client. When using a non-IVPN client simply append the short name (2 letter country code) of the exit server to your username e.g. if you connect to the UK server with the username ivpn123456@ro then your traffic will enter the VPN in the UK and exit in Romania. Of course if you are using the latest IVPN client v2.4 then this configuration is fully transparent.

The DNS servers for multi-hop connections are now positioned in the exit location. Previously if you connected to UK->NL your DNS requests would be resolved by a DNS server based in the location where you connected i.e. the UK. Now your requests will be forwarded through the tunnel to a DNS server in the exit location (in this case NL). This again mitigates the risk of traffic analysis thereby improving your security.

As mentioned in the previous blog update, we now have a reservation based port forwarding system so you can keep the same port number for as long as you want. In addition to port forwarding on the standard singlehop network you can also use port forwarding on the multi-hop network. So if you activate port forwarding and connect to UK->NL, any traffic sent to the server in NL on your assigned port will be forwarded through the VPN to the UK server and then through the VPN to your device.

We hope you’re as excited about these developments as we are. If you have any feedback we’d love to hear it - feedback@ivpn.net.

Apps Privacy
We invite you to discuss this post in our Reddit community or on Twitter. You can also send your feedback to blog@ivpn.net.

4 Comments

Adam vij

02.01.2017

I would like to see what you think about:

https://airvpn.info/topic/15854-airvpn-must-offer-multi-hop-double-vpn-and-tor-overvpn-in-openvpn-config/?p=52124

Since I am considering signing up for IVPN, but your multi-hop seems a bit.. pointless?

John

21.04.2017

i think the multi hop is great and the only reason I will join.

Micheal

07.09.2018

Taking guidance from a blog about Multi Hop VPN and comparing your features with it…. I think it will be a good idea to join in.. Thanks a lot.

Oliver

02.04.2020

Multi hop is a amazing feature and everyone should try this :)
IVPN News

Independent security audit concluded

By Nick Pestell

IVPN News

IVPN applications are now open source

By Viktor Vecsei

Releases

Beta IVPN Linux app released

By Viktor Vecsei

Releases

Key rotation issue fix in IVPN iOS app – update required

Posted on February 18, 2025 by Viktor Vecsei

In summary: We identified a potential DNS leak issue affecting our iOS app in brief intervals during WireGuard key regeneration. Details of the issue When IVPN iOS app rotates WireGuard keys while VPN is connected, the app calls the asynchronous method setTunnelNetworkSettings to update VPN tunnel with new configuration.
Introducing device management for better control of logged in devices Releases

Introducing device management for better control of logged in devices

Posted on February 13, 2024 by Viktor Vecsei

We are introducing IVPN device management, an opt-in (disabled by default) feature that helps you review and log out from devices currently logged in to IVPN apps. This step is a direct response to frequent customer requests for better device controls.
Spotted a mistake or have an idea on how to improve this page?
Suggest an edit on GitHub.