Displaying 2 results from an estimated 2 matches for "embeddish".
Did you mean:
embedding
2015 Nov 23
0
Authenticating VPN addresses: a proposal
...e LANs).
I use StrictSubnets and I happy with them. That was choice from the
beginning. But it also enforced to have all node keys and configuration
data on each node. Up to Sep2015, I employed a central http server for
that, like chaosvpn does. But that central server lost it's key (it was
an embeddish system) and the service stopped working.
Since that I was forced to implement a protocol extension to tinc that
adds such a service directly inside the daemon and it now performs
perfectly. You can find an announcement about it earlier in tinc
archives of Oct2015.
I don't think StrictSubnets...
2015 Nov 22
5
Authenticating VPN addresses: a proposal
TL;DR: a proposal for a new tinc feature that allows nodes to filter
ADD_SUBNET messages based on the metaconnection on which they are
received, so that nodes can't impersonate each other's VPN Subnets.
Similar to StrictSubnets in spirit, but way more flexible.
BACKGROUND: THE ISSUE OF TRUST IN A TINC NETWORK
In terms of metaconnections (I'm not discussing data tunnels here),
one of