Displaying 4 results from an estimated 4 matches for "siblynx".
Did you mean:
sibling
2016 Mar 13
1
Fwd: How to avoid friends of friends joining the vpn ?
Thanks I will look into StrictSubnets,
while digging through the mailling list I came across this:
https://github.com/siblynx/tinc-1.0.16_hostupd/blob/master/README.hostupd
which is pretty close to what I need
That looks to be a fork on its own, with no PR raises for addding that
functionality to the main tinc, unless I missed it out.
Are there any plans to bring that functionality in ?
-azul
On 13 March 2016 at 17:52...
2015 Oct 16
2
Automatic hosts files update protocol extension for Tinc
...bsystem.
The idea is to provide stable protocol extension to tinc which will do
all the dirty work of spreading information about new hosts in network
across all nodes by powers of tinc itself.
If you're interested, you can take a look at the diff made for tinc
1.0.16 here:
https://github.com/siblynx/tinc-1.0.16_hostupd/commit/6a6cc34d6d80696ea525956375de59c7f752fa42
The code introduces two request types, and uses RSA signatures to
prevent tampering. It also introduces some sort of privileges: who can
and who cannot spread updates. Each node which has child connections
forwards update requests...
2015 Oct 16
0
Automatic hosts files update protocol extension for Tinc
...table protocol extension to tinc which will do
> all the dirty work of spreading information about new hosts in network
> across all nodes by powers of tinc itself.
>
> If you're interested, you can take a look at the diff made for tinc
> 1.0.16 here:
>
> https://github.com/siblynx/tinc-1.0.16_hostupd/commit/6a6cc34d6d80696ea525956375de59c7f752fa42
>
> The code introduces two request types, and uses RSA signatures to
> prevent tampering. It also introduces some sort of privileges: who can
> and who cannot spread updates. Each node which has child connections
>...
2016 Mar 13
2
Fwd: How to avoid friends of friends joining the vpn ?
Tinc 1.0
3 control masters
Many service hosts
Laptop (road warrior)
The control masters have the public keys for the service hosts and the
laptop so that they can join the network.
How can I prevent the laptop user to connect additional boxes to the
network?
In my view he can simply add new 'foreign' hosts and specify connectTo to
point to the laptop.
As keys are exchanged automatically