Displaying 20 results from an estimated 20000 matches similar to: "tinc"
2001 Feb 27
1
[CVS] humbolt:/tinc/src net.c
Guus Sliepen wrote:
> - Added TCP_NODELAY and IPTOS_LOWDELAY options for meta sockets.
Maybe it's better to make these optional?
--
Ivo Timmermans
---
TINC development list, tinc-devel@nl.linux.org
Archive: http://mail.nl.linux.org/tinc-devel/
2001 Jun 29
1
[CVS] humbolt:/tinc/po es.po
Guus Sliepen wrote:
> Spanish translation removed. Nobody maintains it, and it is severely
> outdated.
Maybe it encourages people to update it if you leave it? Maybe place
a comment somewhere visible saying that we would like to have it
updated?
--
Ivo Timmermans
-
Tinc: Discussion list about the tinc VPN daemon
Archive: http://mail.nl.linux.org/lists/
Tinc site:
2013 Aug 04
1
10th anniversary of tinc 1.0
Hello everyone,
Today is exactly 10 years ago that tinc 1.0 was released. I would have hoped to
celebrate this by releasing 1.0.22 and 1.1pre8 today, but this will instead
happen in one week.
Tinc 1.1 is close to becoming stable, and I hope to release 1.1.0 before the
end of the year. The main features of tinc 1.1 are the improved security over
tinc 1.0, and a much nicer interface that makes it
2013 Aug 04
1
10th anniversary of tinc 1.0
Hello everyone,
Today is exactly 10 years ago that tinc 1.0 was released. I would have hoped to
celebrate this by releasing 1.0.22 and 1.1pre8 today, but this will instead
happen in one week.
Tinc 1.1 is close to becoming stable, and I hope to release 1.1.0 before the
end of the year. The main features of tinc 1.1 are the improved security over
tinc 1.0, and a much nicer interface that makes it
2000 Aug 27
4
[URGENT] tinc has a security hole of about 50 million km^2
Sending your passphrase encrypted is all fine, but tinc sends the key
with which it was encrypted about a second later...
Anyone being able to intercept these two requests is authorized on the
VPN.
We need asymmetric authentication _now_.
--
Ivo Timmermans
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size:
2000 Jun 23
2
tinc 0.3.3 vs. 1.0pre2
Hi Ivo,
--On Freitag, 23. Juni 2000 01:15 +0200 Ivo Timmermans <zarq@icicle.yi.org>
wrote:
> I'm not sure I fully understand your patch.
This is not so important since I'm trying to get 1.0pre2 running.
Although I had no luck so far, I'll point out what's going wrong at the end
of this mail.
> For instance, you force a
> key exchange when the connection is made,
2000 Sep 10
2
tinc SECURITY INFORMATION - Unauthorized access to VPN
Although we (the authors of tinc) have done our best to make tinc as
secure as possible, an unfortunate combination of encryption and key
exchange techniques has created a hole in at least all versions of
tinc >= 0.3, including the current CVS version.
Exploit:
If somebody can intercept the meta protocol to a host that is running
a tinc daemon, it is possible to decrypt the passphrase, which
2000 Sep 10
2
tinc SECURITY INFORMATION - Unauthorized access to VPN
Although we (the authors of tinc) have done our best to make tinc as
secure as possible, an unfortunate combination of encryption and key
exchange techniques has created a hole in at least all versions of
tinc >= 0.3, including the current CVS version.
Exploit:
If somebody can intercept the meta protocol to a host that is running
a tinc daemon, it is possible to decrypt the passphrase, which
2000 Aug 21
2
tinc TODO list
Hi, here's a small list of things that need to be done, and the
version when it should be ready.
smartcard support 1.1
LDAP support 1.1
public/private keys for authentication 1.1
don't store passphrases in files that are called after IP addresses
1.0
use names to identify
2018 May 19
3
Issue using tinc-vpn on Windows Server 1709 with Docker Overlay Network
Hello everyone,
I am running into the following error messages everytime I try to use a
docker overlay network on top of tinc-vpn:
Error getting read result from Windows tap device
{F30C422F-4524-435F-A15B-71A7E08C260D}: (995) The I/O operation has been
aborted because of either a thread exit or an application request.
Received packet of 106 bytes from ... (... port 655)
Writing packet of 106
2018 May 19
1
Issue using tinc-vpn on Windows Server 1709 with Docker Overlay Network
I've not had success with using tinc and docker together. I came up against similar problems. Docker iptables in Linux seem quite complicated as well, messing with the network stack.
I've seen a few tinc docker images that run tinc as a container - I haven't tried this.
Please let us know if you do actually get it working - im very interested to know.
Mike
On 20 May 2018 12:55 am,
2001 Mar 08
2
Tinc behind firewall?
On Thu, Mar 08, 2001 at 11:51:53AM +0100, Marcel Loesberg wrote:
> I'm going to build a VPN and I want to use either Tinc or FreeS/WAN.
> I've started building the VPN with FreeS/WAN and I find things are getting
> rather complicated.
> I looks like Tinc is much easier to configure but in the FAQ and in what I've
> seen of the documentation so far there is no mention of
2018 May 20
0
Issue using tinc-vpn on Windows Server 1709 with Docker Overlay Network
Hi Marc,
A number of bugs have been found and fixed in the code that deals with
Windows devices in tinc 1.1:
https://github.com/gsliepen/tinc/pull/169
https://github.com/gsliepen/tinc/pull/173
https://github.com/gsliepen/tinc/pull/174
https://github.com/gsliepen/tinc/pull/181
https://github.com/gsliepen/tinc/pull/182
Unfortunately, these fixes have not made it in a tinc 1.1 release yet,
but
2000 Nov 12
1
Balanced trees in tinc
Hi everybody,
I'm looking into replacing the linked lists in tinc with balanced trees. Using
balanced trees will greatly improve performance for medium to large VPNs. As I
see it, there are several options:
1) Use tsearch()/twalk()/etc functions from glibc.
+ It is in a very standard library
- It relies solely on callback functions, which sometimes results in
ugly, awkward code (I
2000 May 12
2
tinc 1.0pre1
Hi all,
I just uploaded tinc 1.0pre1 to the server. I included and rpm, which
has been made possible by the work of Lubom?r Bulej and Mads
Kiilerich.
Please test this version, so that any bugs left can be squished before
1.0 gets final. Also be aware that this version includes a new
version of the protocol, and is thus NOT compatible with the protocol
that 0.3 uses.
Thanks for flying tinc.
2000 May 12
2
tinc 1.0pre1
Hi all,
I just uploaded tinc 1.0pre1 to the server. I included and rpm, which
has been made possible by the work of Lubom?r Bulej and Mads
Kiilerich.
Please test this version, so that any bugs left can be squished before
1.0 gets final. Also be aware that this version includes a new
version of the protocol, and is thus NOT compatible with the protocol
that 0.3 uses.
Thanks for flying tinc.
2007 Jun 10
1
Setup problems, /dev/net/tun FD in bad state
Hi all, I'm following the manual but I get the below error, and I
believe tinc is clobbering my conf file.
I've never set up VPN before, I'm just trying to connect to my work
network from home. All the following is on my work computer. Thanks in
advance for any help.
$ ifconfig eth0
eth0 Link encap:Ethernet HWaddr 00:1A:A0:17:3A:50
inet addr:172.24.104.145
2001 May 25
4
tinc 1.0pre4 released
Hello everybody,
I have just released tinc 1.0pre4. Changes:
- New authentication protocol (better security, and faster too).
- TCPonly and IndirectData are back (but not fully tested).
- Documentation revised, it's really up to date with the released package now.
- tincd -K now stores public/private keys in PEM format, but keys of 1.0pre3
can still be used.
- Faster and more secure
2000 Apr 25
1
0.3.4 is due
On Mon Apr 24 2000, Mike MacNeill <mikem@accesscomm.ca> wrote:
> I downloaded the cabal version as well and I seem to have discovered a
> problem.
>
> Whenever the regenerate key goes off it manages to eat memory somewhere.
>
> I set the regen time from 90 minutes to basically all day.
>
> Have you tried running this under efence?
efence didn't show anything
2001 Mar 19
4
Tinc doesn't connect
Hi,
I'm trying to set-up a VPN using Tinc 1.0pre3.
When I start tincd I get the following in /var/log/messages.
On the machine that listens for incomming connections:
> Mar 16 17:23:24 vpn tinc[1168]: tincd 1.0pre3 starting
> Mar 16 17:23:24 vpn tinc[1168]: Ready: listening on port 655
On the machine making the connection:
> Mar 16 17:16:51 mail tinc[802]: tincd 1.0pre3 starting