No, it is not secure and we only recommend using it when security is not required/important e.g. If you are streaming content that requires an IP in a different location. To understand why it is not secure read on.

For wide compatibility with client devices and ease of setup the L2TP/IPSec service uses a pre-shared key for authentication. This key is published on the IVPN website and is therefore accessible by anyone.

However this pre-shared key is not used to encrypt the data between your device and our VPN servers, only to authenticate the server to the client device. A passive adversary eavesdropping on the connection is unable to decrypt the tunnel data. However there does exist a risk of an active MITM (Man in the middle attack) where the adversary impersonates our server and is then able to decrypt and eavesdrop on the connection.

This capability requires some technical sophistication on the part of the attacker but the possibility is very real and therefore we strongly recommend that customers who require security use an OpenVPN based client e.g the IVPN client. Furthermore leaked NSA presentations released by the "Der Spiegel" publication indicate that IKE is being exploited in an unknown manner to decrypt IPSec traffic.

Further technical info

IPSec uses a protocol called IKE (Internet Key Exchange) which is used to set up a security association (SA) between the client and server. IKE has two phases, during the first phase the client and server generate and exchange nounces after which they perform a Diffie–Hellman key exchange. Both sides then use the nounce, the Diffie-Hellman shared secret and the pre-shared key to generate the IKE keys. These IKE Keys are then used in the second stage to generate the IPSec SA's which contain the session keys used to encrypt the tunnel data.

Because of the Diffie-Hellman operation in phase 1 a passive eavesdropper would be unable to derive the same set of session keys used to encrypt the tunnel data. However as mentioned above an active MITM attack is possible due to the use of the pre-shared key in which case the adversary would be able to eavesdrop or even inject malicious data into the connection.